First published: Tue Oct 15 2024(Updated: )
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file member_register.php. The manipulation of the argument fullname/username/password/email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "password" to be affected. But it must be assumed that other parameters are affected as well.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fabianros Blood Bank Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9986 has been rated as critical due to the potential for SQL injection.
To fix CVE-2024-9986, ensure proper input validation and sanitation for the fullname, username, password, and email parameters in member_register.php.
CVE-2024-9986 affects Blood Bank Management System version 1.0.
CVE-2024-9986 is a SQL injection vulnerability.
The vulnerability CVE-2024-9986 is associated with the file member_register.php.