A vulnerability, which was classified as critical, has been found in code-projects Job Recruitment 1.0. This issue affects some unknown processing of the file /activation.php. The manipulation of the argument e_hash leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
                
            References
                    | Link | Resource | 
|---|---|
| https://code-projects.org/ | Product | 
| https://github.com/UnrealdDei/cve/blob/main/sql2-rce.md | Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.283871 | Permissions Required VDB Entry | 
| https://vuldb.com/?id.283871 | Third Party Advisory VDB Entry | 
| https://vuldb.com/?submit.441182 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    14 Nov 2024, 19:14
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://code-projects.org/ - Product | |
| References | () https://github.com/UnrealdDei/cve/blob/main/sql2-rce.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.283871 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.283871 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.441182 - Third Party Advisory, VDB Entry | |
| CVSS | v2 : v3 : | v2 : 6.5 v3 : 9.8 | 
| First Time | Anisha job Recruitment Anisha | |
| CPE | cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:* | 
12 Nov 2024, 13:55
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
11 Nov 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-11 18:15
Updated : 2024-11-14 19:14
NVD link : CVE-2024-11076
Mitre link : CVE-2024-11076
CVE.ORG link : CVE-2024-11076
JSON object : View
Products Affected
                anisha
- job_recruitment
