CVE-2024-10432
CVSS V2 None
CVSS V3 None
Description
A vulnerability has been found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Overview
- CVE ID
- CVE-2024-10432
- Assigner
- VulDB
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-10-27T23:31:04.374Z
- Last Modified Date
- 2024-10-27T23:31:04.374Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://vuldb.com/?id.281983 | vdb-entry technical-description |
https://vuldb.com/?ctiid.281983 | signature permissions-required |
https://vuldb.com/?submit.432234 | third-party-advisory |
https://github.com/jadu101/CVE/blob/main/project_worlds_simple_web_based_chat_app_index_sqli.md | exploit |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-10432 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10432 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-10-28 13:09:45 | Added to TrackCVE |