A vulnerability was found in code-projects University Event Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file submit.php. The manipulation of the argument name/email/title/Year/gender/fromdate/todate/people leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "name" to be affected. But it must be assumed that a variety of other parameters is affected too.
History

Tue, 05 Nov 2024 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Anisha
Anisha university Event Management System
CPEs cpe:2.3:a:anisha:university_event_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Anisha
Anisha university Event Management System

Tue, 05 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects university Event Management System
CPEs cpe:2.3:a:code-projects:university_event_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects university Event Management System
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 Nov 2024 07:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-707
CWE-74

Sat, 02 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects University Event Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file submit.php. The manipulation of the argument name/email/title/Year/gender/fromdate/todate/people leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "name" to be affected. But it must be assumed that a variety of other parameters is affected too.
Title code-projects University Event Management System submit.php sql injection
Weaknesses CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-11-02T16:00:07.332Z

Updated: 2024-11-05T15:18:01.547Z

Reserved: 2024-11-01T17:05:58.524Z

Link: CVE-2024-10700

cve-icon Vulnrichment

Updated: 2024-11-05T15:17:56.509Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-02T16:15:03.243

Modified: 2024-11-05T20:15:39.427

Link: CVE-2024-10700

cve-icon Redhat

No data.