First published: Sat Nov 02 2024(Updated: )
A vulnerability was found in code-projects University Event Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file submit.php. The manipulation of the argument name/email/title/Year/gender/fromdate/todate/people leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "name" to be affected. But it must be assumed that a variety of other parameters is affected too.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Anisha University Event Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10700 has been declared as critical due to its potential impact on the University Event Management System.
To fix CVE-2024-10700, it is recommended to sanitize and validate the input parameters in the submit.php file to prevent SQL injection.
CVE-2024-10700 affects version 1.0 of the Anisha University Event Management System.
CVE-2024-10700 is an SQL injection vulnerability caused by improper handling of user input.
Exploitation of CVE-2024-10700 could lead to unauthorized access to the database and manipulation of sensitive data.