CVE-2024-4972
CVSS V2 None
CVSS V3 None
Description
A vulnerability classified as critical has been found in code-projects Simple Chat System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument email/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264537 was assigned to this vulnerability.
Overview
- CVE ID
- CVE-2024-4972
- Assigner
- VulDB
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-05-16T09:00:04.678Z
- Last Modified Date
- 2024-06-04T17:54:59.072Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://vuldb.com/?id.264537 | vdb-entry technical-description |
https://vuldb.com/?ctiid.264537 | signature permissions-required |
https://vuldb.com/?submit.335199 | third-party-advisory |
https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md | exploit |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-4972 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4972 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-23 22:37:55 | Added to TrackCVE |