First published: Thu May 16 2024(Updated: )
A vulnerability classified as critical was found in code-projects Simple Chat System 1.0. This vulnerability affects unknown code of the file /register.php. The manipulation of the argument name/number/address leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264538 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simple Chat System | =1.0 | |
Simple Chat System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4973 is classified as a critical vulnerability.
CVE-2024-4973 is a SQL injection vulnerability.
To fix CVE-2024-4973, ensure that all user input is properly validated and sanitized in the '/register.php' file.
Yes, CVE-2024-4973 can be exploited remotely.
CVE-2024-4973 affects Simple Chat System version 1.0.