A vulnerability classified as critical was found in code-projects Simple Chat System 1.0. This vulnerability affects unknown code of the file /register.php. The manipulation of the argument name/number/address leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264538 is the identifier assigned to this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.264538 | Permissions Required VDB Entry |
| https://vuldb.com/?id.264538 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.335200 | Third Party Advisory VDB Entry |
| https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.264538 | Permissions Required VDB Entry |
| https://vuldb.com/?id.264538 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.335200 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-05-16 10:15
Updated : 2025-02-18 18:41
NVD link : CVE-2024-4973
Mitre link : CVE-2024-4973
CVE.ORG link : CVE-2024-4973
JSON object : View
Products Affected
code-projects
- simple_chat_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
