{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T20:20:41.863","vulnerabilities":[{"cve":{"id":"CVE-2024-29390","sourceIdentifier":"cve@mitre.org","published":"2024-06-20T21:15:49.583","lastModified":"2025-06-20T18:55:47.947","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Daily Expenses Management System version 1.0, developed by PHP Gurukul, contains a time-based blind SQL injection vulnerability in the 'add-expense.php' page. An attacker can exploit the 'item' parameter in a POST request to execute arbitrary SQL commands in the backend database. This can be done by injecting specially crafted SQL queries that make the database perform time-consuming operations, thereby confirming the presence of the SQL injection vulnerability based on the delay in the server's response."},{"lang":"es","value":"La versión 1.0 de Daily Expenses Management System, desarrollado por PHP Gurukul, contiene una vulnerabilidad de inyección SQL ciega basada en el tiempo en la página 'add-expense.php'. Un atacante puede explotar el parámetro 'elemento' en una solicitud POST para ejecutar comandos SQL arbitrarios en la base de datos backend. Esto se puede hacer inyectando consultas SQL especialmente manipuladas que hacen que la base de datos realice operaciones que consumen mucho tiempo, confirmando así la presencia de la vulnerabilidad de inyección SQL basada en el retraso en la respuesta del servidor."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:anujk305:daily_expenses_management_system:1.0:*:*:*:*:*:*:*","matchCriteriaId":"CF5FB6C2-F1F6-4500-A5CA-EC9BB94F9F76"}]}]}],"references":[{"url":"https://github.com/CyberSentryX/CVE_Hunting/blob/main/CVE-2024-29390/README.md","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/CyberSentryX/CVE_Hunting/blob/main/CVE-2024-29390/README.md","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}