CVE-2024-10739

HIGH

Anisha E-health Care System - SQL Injection

Title source: rule
STIX 2.1

Description

A vulnerability, which was classified as critical, has been found in code-projects E-Health Care System 1.0. Affected by this issue is some unknown functionality of the file /Admin/adminlogin.php. The manipulation of the argument email/admin_pswd as part of String leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "email" to be affected. But it must be assumed that parameter "admin_pswd" is affected as well.

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.282908
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.282908
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.436014
Product product
https://code-projects.org/

Scores

CVSS v3 7.3
EPSS 0.0010
EPSS Percentile 27.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (1)
anisha/e-health_care_system 1.0
Published Nov 03, 2024
Tracked Since Feb 18, 2026