### [CVE-2024-9318](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9318) ![](https://img.shields.io/static/v1?label=Product&message=Advocate%20Office%20Management%20System&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=SQL%20Injection&color=brighgreen) ### Description A vulnerability, which was classified as critical, has been found in SourceCodester Advocate Office Management System 1.0. Affected by this issue is some unknown functionality of the file /control/activate.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### POC #### Reference - https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20activate.php%20error-based%20SQL%20Injection%20Vulnerability.md #### Github No PoCs found on GitHub currently.