CVE-2024-8368

A vulnerability was found in code-projects Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*

History

13 Sep 2024, 19:23

Type Values Removed Values Added
References () https://code-projects.org/ - () https://code-projects.org/ - Product
References () https://github.com/qingluan-bot/cve/issues/1 - () https://github.com/qingluan-bot/cve/issues/1 - Exploit
References () https://vuldb.com/?ctiid.276272 - () https://vuldb.com/?ctiid.276272 - Permissions Required
References () https://vuldb.com/?id.276272 - () https://vuldb.com/?id.276272 - Third Party Advisory
References () https://vuldb.com/?submit.400787 - () https://vuldb.com/?submit.400787 - Third Party Advisory
First Time Fabianros hospital Management System
Fabianros
CPE cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*
CVSS v2 : 7.5
v3 : 7.3
v2 : 7.5
v3 : 9.8

03 Sep 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en code-projects Hospital Management System 1.0. Se ha calificado como crítica. Este problema afecta a una funcionalidad desconocida del archivo index.php del componente Login. La manipulación del argumento username provoca una inyección SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho público y puede utilizarse.

01 Sep 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-01 05:15

Updated : 2024-09-13 19:23


NVD link : CVE-2024-8368

Mitre link : CVE-2024-8368

CVE.ORG link : CVE-2024-8368


JSON object : View

Products Affected

fabianros

  • hospital_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')