Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33912 | A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument sername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
Thu, 21 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
1000projects
1000projects beauty Parlour Management System |
|
| CPEs | cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
1000projects
1000projects beauty Parlour Management System |
|
| Metrics |
ssvc
|
Thu, 21 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument sername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | 1000 Projects Beauty Parlour Management System add-services.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-11-21T14:13:59.736Z
Reserved: 2024-11-21T07:04:52.381Z
Link: CVE-2024-11591
Updated: 2024-11-21T14:13:51.252Z
Status : Analyzed
Published: 2024-11-21T14:15:08.713
Modified: 2024-12-10T16:55:46.527
Link: CVE-2024-11591
No data.
OpenCVE Enrichment
No data.
EUVD