First published: Sun Oct 27 2024(Updated: )
A vulnerability has been found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Simple Web-based Chat Application | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10432 is classified as a critical vulnerability targeting a SQL injection flaw in the Simple Web-Based Chat Application.
To fix CVE-2024-10432, update the affected Simple Web-Based Chat Application to the latest version that addresses this vulnerability.
CVE-2024-10432 affects version 1.0 of the Project Worlds Simple Web-Based Chat Application.
CVE-2024-10432 is associated with SQL injection attacks that exploit the username parameter in the /index.php file.
Exploitation of CVE-2024-10432 can lead to unauthorized access to the database and sensitive data leakage.