A vulnerability was found in code-projects University Event Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file submit.php. The manipulation of the argument name/email/title/Year/gender/fromdate/todate/people leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "name" to be affected. But it must be assumed that a variety of other parameters is affected too.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/aa1928992772/CVE/blob/main/sqlInjection.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.282868 | Permissions Required VDB Entry |
https://vuldb.com/?id.282868 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.435051 | Third Party Advisory VDB Entry |
Configurations
History
05 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
Anisha
Anisha university Event Management System |
|
CPE | cpe:2.3:a:anisha:university_event_management_system:1.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 9.8 |
References | () https://code-projects.org/ - Product | |
References | () https://github.com/aa1928992772/CVE/blob/main/sqlInjection.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.282868 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.282868 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.435051 - Third Party Advisory, VDB Entry | |
Summary |
|
04 Nov 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-707 CWE-74 |
02 Nov 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-02 16:15
Updated : 2024-11-05 20:15
NVD link : CVE-2024-10700
Mitre link : CVE-2024-10700
CVE.ORG link : CVE-2024-10700
JSON object : View
Products Affected
anisha
- university_event_management_system