Description
A vulnerability classified as critical has been found in code-projects Simple Chat System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument email/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264537 was assigned to this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-44529 | A vulnerability classified as critical has been found in code-projects Simple Chat System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument email/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264537 was assigned to this vulnerability. |
References
History
Tue, 18 Feb 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code-projects
Code-projects simple Chat System |
|
| CPEs | cpe:2.3:a:code-projects:simple_chat_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Code-projects
Code-projects simple Chat System |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-01T20:55:10.397Z
Reserved: 2024-05-15T20:02:05.518Z
Link: CVE-2024-4972
Updated: 2024-08-01T20:55:10.397Z
Status : Analyzed
Published: 2024-05-16T09:15:18.277
Modified: 2025-02-18T18:38:56.967
Link: CVE-2024-4972
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD