CVE-2024-5517

A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file changepwd.php. The manipulation of the argument useremail leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266588.
References
Link Resource
https://github.com/ppp-src/ha/issues/4 Exploit Third Party Advisory
https://vuldb.com/?ctiid.266588 Permissions Required VDB Entry
https://vuldb.com/?id.266588 Third Party Advisory VDB Entry
https://vuldb.com/?submit.346225 Third Party Advisory VDB Entry
https://github.com/ppp-src/ha/issues/4 Exploit Third Party Advisory
https://vuldb.com/?ctiid.266588 Permissions Required VDB Entry
https://vuldb.com/?id.266588 Third Party Advisory VDB Entry
https://vuldb.com/?submit.346225 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*

History

11 Feb 2025, 15:11

Type Values Removed Values Added
CPE cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*
First Time Adonesevangelista
Adonesevangelista online Blood Bank Management System
References () https://github.com/ppp-src/ha/issues/4 - () https://github.com/ppp-src/ha/issues/4 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.266588 - () https://vuldb.com/?ctiid.266588 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.266588 - () https://vuldb.com/?id.266588 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.346225 - () https://vuldb.com/?submit.346225 - Third Party Advisory, VDB Entry

21 Nov 2024, 09:47

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en itsourcecode Online Blood Bank Management System 1.0. Ha sido calificada como crítica. Una función desconocida del archivo changepwd.php es afectada por esta vulnerabilidad. La manipulación del argumento useremail conduce a la inyección de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-266588.
References () https://github.com/ppp-src/ha/issues/4 - () https://github.com/ppp-src/ha/issues/4 -
References () https://vuldb.com/?ctiid.266588 - () https://vuldb.com/?ctiid.266588 -
References () https://vuldb.com/?id.266588 - () https://vuldb.com/?id.266588 -
References () https://vuldb.com/?submit.346225 - () https://vuldb.com/?submit.346225 -

30 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-30 15:15

Updated : 2025-02-11 15:11


NVD link : CVE-2024-5517

Mitre link : CVE-2024-5517

CVE.ORG link : CVE-2024-5517


JSON object : View

Products Affected

adonesevangelista

  • online_blood_bank_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')