Vulnerability Description
A vulnerability classified as critical was found in code-projects Simple Chat System 1.0. This vulnerability affects unknown code of the file /register.php. The manipulation of the argument name/number/address leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264538 is the identifier assigned to this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Code-Projects | Simple Chat System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%ExploitThird Party Advisory
- https://vuldb.com/?ctiid.264538Permissions RequiredVDB Entry
- https://vuldb.com/?id.264538Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.335200Third Party AdvisoryVDB Entry
- https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%ExploitThird Party Advisory
- https://vuldb.com/?ctiid.264538Permissions RequiredVDB Entry
- https://vuldb.com/?id.264538Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.335200Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-4973?
CVE-2024-4973 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability classified as critical was found in code-projects Simple Chat System 1.0. This vulnerability affects unknown code of the file /register.php. The manipulation of the argument name/numbe...
How severe is CVE-2024-4973?
CVE-2024-4973 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-4973?
Check the references section above for vendor advisories and patch information. Affected products include: Code-Projects Simple Chat System.