A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /file/request.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-33199 A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /file/request.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 05 Nov 2024 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Fabianros
Fabianros blood Bank Management System
CPEs cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabianros
Fabianros blood Bank Management System

Fri, 01 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects blood Bank Management System
CPEs cpe:2.3:a:code-projects:blood_bank_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects blood Bank Management System
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 31 Oct 2024 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /file/request.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Blood Bank Management System request.php cross-site request forgery
Weaknesses CWE-352
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-11-01T20:28:35.499Z

Reserved: 2024-10-31T15:33:23.752Z

Link: CVE-2024-10605

cve-icon Vulnrichment

Updated: 2024-11-01T20:28:27.863Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-01T00:15:03.243

Modified: 2024-11-05T16:22:08.017

Link: CVE-2024-10605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.