Filtered by vendor Code-projects Subscriptions
Filtered by product Blood Bank Management System Subscriptions
Total 4 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-10605 2 Code-projects, Fabianros 2 Blood Bank Management System, Blood Bank Management System 2024-11-05 4.3 Medium
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /file/request.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-10557 2 Code-projects, Fabianros 2 Blood Bank Management System, Blood Bank Management System 2024-11-01 4.3 Medium
A vulnerability has been found in code-projects Blood Bank Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /file/updateprofile.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-9986 2 Code-projects, Fabianros 2 Blood Bank Management System, Blood Bank Management System 2024-10-21 7.3 High
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file member_register.php. The manipulation of the argument fullname/username/password/email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "password" to be affected. But it must be assumed that other parameters are affected as well.
CVE-2024-9040 1 Code-projects 1 Blood Bank Management System 2024-09-27 2.3 Low
A vulnerability, which was classified as problematic, was found in code-projects Blood Bank Management System 1.0. This affects an unknown part of the component Password Handler. The manipulation leads to cleartext storage in a file or on disk. An attack has to be approached locally.