Filtered by vendor Blood Bank Management System Project
Subscriptions
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-4738 | 1 Blood Bank Management System Project | 1 Blood Bank Management System | 2024-11-21 | 4.3 Medium |
A vulnerability classified as problematic has been found in SourceCodester Blood Bank Management System 1.0. Affected is an unknown function of the file index.php?page=users of the component User Registration Handler. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-216774 is the identifier assigned to this vulnerability. | ||||
CVE-2022-4737 | 1 Blood Bank Management System Project | 1 Blood Bank Management System | 2024-11-21 | 7.3 High |
A vulnerability was found in SourceCodester Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The identifier VDB-216773 was assigned to this vulnerability. | ||||
CVE-2024-10415 | 2 Blood Bank Management System Project, Fabianros | 2 Blood Bank Management System, Blood Bank Management System | 2024-10-29 | 6.3 Medium |
A vulnerability has been found in code-projects Blood Bank Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /file/accept.php. The manipulation of the argument reqid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | ||||
CVE-2024-9316 | 2 Blood Bank Management System Project, Code-projects | 2 Blood Bank Management System, Blood Bank System | 2024-10-02 | 6.3 Medium |
A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/blood/update/B+.php. The manipulation of the argument Bloodname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
Page 1 of 1.