code-projects Blood Bank Management System 1.0 /file/delete.php bid Kari ndiyam site laa request forgery

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a code-projects Blood Bank Management System 1.0. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil /file/delete.php, a cikin sashi $software_component. Wuro manipulation of the argument bid ga Kari ndiyam site laa request forgery. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-352. Lalle, rauni an sanar da shi 10/28/2024. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2024-10448. Ngam yiɗi ka a tuma ndiyam ka internet. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get best quality of vulnerability data, you may have to visit VulDB.

3 Goyarwa · 101 Datenpunkte

FurɗeSúgá
10/28/2024 07:22
Gargadi 1/2
03/02/2025 22:56
Gargadi 2/2
10/23/2025 23:13
cvss4_vuldb_acLLL
cvss4_vuldb_prNNN
cvss4_vuldb_vcNNN
cvss4_vuldb_viLLL
cvss4_vuldb_vaNNN
cvss4_vuldb_ePPP
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss4_vuldb_atNNN
cvss4_vuldb_uiNPP
cvss4_vuldb_scNNN
cvss4_vuldb_siNNN
cvss4_vuldb_saNNN
cvss2_vuldb_basescore5.05.05.0
cvss2_vuldb_tempscore4.34.34.3
cvss3_vuldb_basescore4.34.34.3
cvss3_vuldb_tempscore3.93.93.9
cvss3_meta_basescore4.34.35.0
cvss3_meta_tempscore3.93.94.9
cvss4_vuldb_bscore6.95.35.3
cvss4_vuldb_btscore5.52.12.1
advisory_date1730070000 (10/28/2024)1730070000 (10/28/2024)1730070000 (10/28/2024)
price_0day$0-$5k$0-$5k$0-$5k
software_vendorcode-projectscode-projectscode-projects
software_nameBlood Bank Management SystemBlood Bank Management SystemBlood Bank Management System
software_version1.01.01.0
software_file/file/delete.php/file/delete.php/file/delete.php
software_argumentbidbidbid
vulnerability_cweCWE-352 (Kari ndiyam site laa request forgery)CWE-352 (Kari ndiyam site laa request forgery)CWE-352 (Kari ndiyam site laa request forgery)
vulnerability_risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/bevennyamande/bloodbank_delete_csrf_attackhttps://github.com/bevennyamande/bloodbank_delete_csrf_attackhttps://github.com/bevennyamande/bloodbank_delete_csrf_attack
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/bevennyamande/bloodbank_delete_csrf_attackhttps://github.com/bevennyamande/bloodbank_delete_csrf_attackhttps://github.com/bevennyamande/bloodbank_delete_csrf_attack
source_cveCVE-2024-10448CVE-2024-10448CVE-2024-10448
cna_responsibleVulDBVulDBVulDB
decision_summaryOther endpoints might be affected as well.Other endpoints might be affected as well.Other endpoints might be affected as well.
software_typeBanking SoftwareBanking SoftwareBanking Software
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss4_vuldb_avNNN
cvss2_cna_auN
cvss2_cna_ciN
cvss2_cna_iiP
cvss2_cna_aiN
cvss2_cna_basescore5
cve_nvd_summaryA vulnerability, which was classified as problematic, has been found in code-projects Blood Bank Management System 1.0. Affected by this issue is some unknown functionality of the file /file/delete.php. The manipulation of the argument bid leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other endpoints might be affected as well.
cve_nvd_summaryesSe ha encontrado una vulnerabilidad clasificada como problemática en code-projects Blood Bank Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /file/delete.php. La manipulación del argumento bid conduce a cross-site request forgery. El ataque puede ejecutarse de forma remota. El exploit se ha hecho público y puede utilizarse. También pueden verse afectados otros endpoints.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prN
cvss4_cna_uiN
cvss4_cna_vcN
cvss4_cna_viL
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore6.9
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cvss3_cna_basescore4.3
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iH
cvss3_nvd_aN
cvss3_nvd_basescore6.5
cvss2_cna_avN
cvss2_cna_acL

Do you need the next level of professionalism?

Upgrade your account now!