Vulnerability Description
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file member_register.php. The manipulation of the argument fullname/username/password/email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "password" to be affected. But it must be assumed that other parameters are affected as well.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fabian | Blood Bank Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/Lanxiy7th/lx_CVE_report-/issues/16ExploitThird Party Advisory
- https://vuldb.com/?ctiid.280349Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.280349Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.423887Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-9986?
CVE-2024-9986 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file member_register.php. The manipulation...
How severe is CVE-2024-9986?
CVE-2024-9986 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-9986?
Check the references section above for vendor advisories and patch information. Affected products include: Fabian Blood Bank Management System.