cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2024-9291
2024-09-27T21:15:03.667
A vulnerability classified as problematic has been found in kalvinGit kvf-admin up to f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff. Affected is an unknown function of the file /ueditor/upload?configPath=ueditor/config.json&action=uploadfile of the component XML File Handler. The manipulation of the argument upfile leads to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/daxiangya/kvf-admin/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/user-attachments/files/17058501/kvf-admin_xss.md" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kvf-admin_project:kvf-admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "2664551A-27E9-4D70-A84A-DA72BD4CF6C7", "versionEndExcluding": null, "versionEndIncluding": "2022-02-12", "ve...
[ "79" ]
79
https://github.com/daxiangya/kvf-admin/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "daxiangya", "kvf-admin" ]
[kvf-admin_xss.md](https://github.com/user-attachments/files/17058501/kvf-admin_xss.md)
kvf-admin_xss.
https://api.github.com/repos/daxiangya/kvf-admin/issues/1/comments
0
2024-09-19T11:50:21Z
2024-10-24T01:03:21Z
https://github.com/daxiangya/kvf-admin/issues/1
2,536,115,662
1
6,298
CVE-2024-9315
2024-09-28T19:15:12.353
A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_department.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zonesec0/findcve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.278819" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B", "versionEndExcluding": null, "versionEndIncluding":...
[ "89" ]
89
https://github.com/zonesec0/findcve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "zonesec0", "findcve" ]
# Description The system Employee and Visitor Gate Pass Logging 1.0 is vulnerable to SQL Injection. The parameter id is not sanitized correctly. Attackers can exploit this vulnerability to gain database privileges. # Vendor Homepage https://www.sourcecodester.com/php/15026/employee-and-visitor-gate-pass-logging-s...
SourceCodester Employee and Visitor Gate Pass Logging System 1.0 manage_department.php id sql injection
https://api.github.com/repos/zonesec0/findcve/issues/3/comments
0
2024-09-23T15:26:19Z
2024-09-23T15:26:19Z
https://github.com/zonesec0/findcve/issues/3
2,543,000,878
3
6,299
CVE-2024-9359
2024-10-01T02:15:10.657
A vulnerability was found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /addcompany.php. The manipulation of the argument company leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/22" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/a/issues/22
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "addcompany.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/restaurant-reservation-system-in-php-with-s...
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "addcompany.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/22/comments
0
2024-09-30T15:13:18Z
2024-09-30T15:13:18Z
https://github.com/ppp-src/a/issues/22
2,556,974,748
22
6,300
CVE-2024-9360
2024-10-01T03:15:02.690
A vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been classified as critical. This affects an unknown part of the file /updatebal.php. The manipulation of the argument company leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halhalz/-/issues/1" }, { "source": "cna@vuldb.com", "tag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/halhalz/-/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halhalz", "-" ]
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "updatebal.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/restaurant-reservation-system-in-php-with-so...
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "updatebal.php" SQL injection
https://api.github.com/repos/halhalz/-/issues/1/comments
0
2024-09-30T15:55:02Z
2024-11-28T07:17:12Z
https://github.com/halhalz/-/issues/1
2,557,070,293
1
6,301
CVE-2024-9429
2024-10-02T13:15:12.617
A vulnerability has been found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter2.php. The manipulation of the argument from/to leads to sql injection. The attack can be launched remotely. The exploit has been di...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/23" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/a/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter2.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/restaurant-reservation-system-in-php-with-sour...
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter2.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/23/comments
0
2024-10-02T02:33:58Z
2025-04-02T15:31:23Z
https://github.com/ppp-src/a/issues/23
2,560,555,911
23
6,302
CVE-2024-9440
2024-10-02T19:15:15.880
Slim Select 2.0 versions through 2.9.0 are affected by a potential cross-site scripting vulnerability. In select.ts:createOption(), the text variable from the user-provided Options object is assigned to an innerHTML without sanitation. Software that depends on this library to dynamically generate lists using unsanitize...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "disclosure@vulncheck.com", "tags": [ "Product" ], "url": "https://github.com/brianvoe/slim-select/blob/e7e37e2ff90e125f846bd98d6b8f278524ead79e/src/slim-select/select.ts#L377" }, { "source": "disclosure@vulncheck.com", "tags": [ "Exploit", "Issue Tracking" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slimselectjs:slim_select:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "F806D61F-99D6-4D30-BE39-543D9D2CB93C", "versionEndExcluding": "2.9.2", "versionEndIncluding": null, "vers...
[ "79" ]
79
https://github.com/brianvoe/slim-select/issues/564
[ "Exploit", "Issue Tracking" ]
github.com
[ "brianvoe", "slim-select" ]
**Describe the bug** I have found a Cross Site Scripting in the library, where should I submit the PoC?
Cross Site Scripting
https://api.github.com/repos/brianvoe/slim-select/issues/564/comments
17
2024-09-03T15:56:31Z
2024-10-16T07:25:51Z
https://github.com/brianvoe/slim-select/issues/564
2,503,241,093
564
6,303
CVE-2024-37868
2024-10-04T21:15:13.150
File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the "sendreply.php" file, and the uploaded file was received using the "$- FILES" variable.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/TERRENCE-REX/bfca92171143e28899bb8511f311f9ed" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TERRENCE-REX...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/TERRENCE-REX/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "TERRENCE-REX", "CVE" ]
# Itsourcecode Online Discussion Forum Project in PHP with Source Code send_reply.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-sourc...
Itsourcecode Online Discussion Forum Project in PHP with Source Code send_reply.php Unrestricted Upload
https://api.github.com/repos/TERRENCE-REX/CVE/issues/1/comments
0
2024-06-09T04:46:31Z
2024-06-09T06:35:02Z
https://github.com/TERRENCE-REX/CVE/issues/1
2,342,020,984
1
6,304
CVE-2024-37869
2024-10-04T21:15:13.240
File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the "poster.php" file, and the uploaded file was received using the "$- FILES" variable
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/TERRENCE-REX/7e5dfdd3583bf9fd81196f557a8b8879" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TERRENCE-REX...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/TERRENCE-REX/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "TERRENCE-REX", "CVE" ]
# Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-co...
Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload
https://api.github.com/repos/TERRENCE-REX/CVE/issues/2/comments
0
2024-06-09T05:22:31Z
2024-06-09T06:39:36Z
https://github.com/TERRENCE-REX/CVE/issues/2
2,342,029,707
2
6,305
CVE-2024-9794
2024-10-10T16:15:09.350
A vulnerability, which was classified as critical, has been found in Codezips Online Shopping Portal 1.0. This issue affects some unknown processing of the file /update-image1.php. The manipulation of the argument productimage1 leads to unrestricted upload. The attack may be initiated remotely. The exploit has been dis...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuld...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:online_shopping_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "755F393E-3C39-4717-A053-6820CD4965B2", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "434" ]
434
https://github.com/ppp-src/CVE/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Online Shopping Portal In PHP With Source Code 1.0 update-image1.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Shopping Portal In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/online-shopping-portal-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## sub...
Codezips Online Shopping Portal In PHP With Source Code 1.0 update-image1.php Unrestricted Upload
https://api.github.com/repos/ppp-src/CVE/issues/7/comments
0
2024-10-02T11:11:50Z
2024-10-03T14:13:14Z
https://github.com/ppp-src/CVE/issues/7
2,561,286,633
7
6,306
CVE-2024-9811
2024-10-10T21:15:05.383
A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. This affects an unknown part of the file filter3.php. The manipulation of the argument company leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/24" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/a/issues/24
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter3.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/restaurant-reservation-system-in-php-with-sour...
# code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter3.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/24/comments
0
2024-10-06T01:10:31Z
2025-04-02T15:31:10Z
https://github.com/ppp-src/a/issues/24
2,568,403,771
24
6,307
CVE-2024-9812
2024-10-10T21:15:05.677
A vulnerability classified as critical was found in code-projects Crud Operation System 1.0. This vulnerability affects unknown code of the file delete.php. The manipulation of the argument sid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/a/issues/25" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/a/issues/25
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "a" ]
# code-projects.org"Crud Operation System" in PHP 1.0 "delete.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + https://code-projects.org/crud-operation-system-in-php-with-source-code/ # AFFEC...
# code-projects.org"Crud Operation System" in PHP 1.0 "delete.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/25/comments
0
2024-10-06T01:18:24Z
2025-04-02T15:31:02Z
https://github.com/ppp-src/a/issues/25
2,568,405,811
25
6,308
CVE-2024-9813
2024-10-10T21:15:05.963
A vulnerability, which was classified as critical, has been found in Codezips Pharmacy Management System 1.0. This issue affects some unknown processing of the file product/register.php. The manipulation of the argument category leads to sql injection. The attack may be initiated remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/10" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:pharmacy_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F881269F-6B88-4C78-866B-B408AA5711F1", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Pharmacy Management System In PHP With Source Code 1.0 product/register.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/pharmacy-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S...
Codezips Pharmacy Management System In PHP With Source Code 1.0 product/register.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/10/comments
0
2024-10-06T08:48:17Z
2024-10-06T08:48:17Z
https://github.com/ppp-src/CVE/issues/10
2,568,544,507
10
6,309
CVE-2024-9814
2024-10-10T22:15:11.570
A vulnerability, which was classified as critical, was found in Codezips Pharmacy Management System 1.0. Affected is an unknown function of the file product/update.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/11" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:pharmacy_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F881269F-6B88-4C78-866B-B408AA5711F1", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Pharmacy Management System In PHP With Source Code 1.0 product/update.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pharmacy Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/pharmacy-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ...
Codezips Pharmacy Management System In PHP With Source Code 1.0 product/update.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/11/comments
0
2024-10-06T08:55:19Z
2024-10-06T08:55:19Z
https://github.com/ppp-src/CVE/issues/11
2,568,547,420
11
6,310
CVE-2024-9815
2024-10-10T22:15:11.917
A vulnerability has been found in Codezips Tourist Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/create-package.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack can be launched remotely. The expl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/12" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:tourist_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A1277B81-4CD0-42A8-9DA0-278FC4A653C2", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "434" ]
434
https://github.com/ppp-src/CVE/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Tourist Management System In PHP With Source Code 1.0 /admin/create-package.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Tourist Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/tourist-management-system-in-php-with-source-code/#google_vignette # AFFECTE...
Codezips Tourist Management System In PHP With Source Code 1.0 /admin/create-package.php Unrestricted Upload
https://api.github.com/repos/ppp-src/CVE/issues/12/comments
0
2024-10-06T10:14:36Z
2024-10-06T10:14:36Z
https://github.com/ppp-src/CVE/issues/12
2,568,579,916
12
6,311
CVE-2024-9816
2024-10-10T22:15:12.230
A vulnerability was found in Codezips Tourist Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/change-image.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack may be launched remotely. The exploit has been ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/13" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:tourist_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A1277B81-4CD0-42A8-9DA0-278FC4A653C2", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "434" ]
434
https://github.com/ppp-src/CVE/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Tourist Management System In PHP With Source Code 1.0 /admin/change-image.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Tourist Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/tourist-management-system-in-php-with-source-code/#google_vignette # AFFECTED ...
Codezips Tourist Management System In PHP With Source Code 1.0 /admin/change-image.php Unrestricted Upload
https://api.github.com/repos/ppp-src/CVE/issues/13/comments
0
2024-10-06T10:17:30Z
2024-10-06T10:17:30Z
https://github.com/ppp-src/CVE/issues/13
2,568,581,089
13
6,312
CVE-2024-25622
2024-10-11T15:15:03.947
h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. The configuration directives provided by the headers handler allows users to modify the response headers being sent by h2o. The configuration file of h2o has scopes, and the inner scopes (e.g., path level) are expected to inherit the configuration defi...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integri...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/h2o/h2o/commit/123f5e2b65dcdba8f7ef659a00d24bd1249141be" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/h2o/h2o/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC5F2FE2-7FF7-428D-9EC7-0201D0077BA8", "versionEndExcluding": null, "versionEndIncluding": "2024-02-11", "versionStartExcluding...
[ "670" ]
670
https://github.com/h2o/h2o/issues/3332
[ "Issue Tracking" ]
github.com
[ "h2o", "h2o" ]
I believe I have found a bug in how H2O handles headers, which are configured in h2o.conf: Adding or setting a header at host or path level under one host, removes all headers set at global level for other hosts. I stumbled on this problem on one of our production servers. This is the simplest h2o.conf to explain th...
Likely bug in handling of header in h2o.conf
https://api.github.com/repos/h2o/h2o/issues/3332/comments
2
2024-01-02T21:07:24Z
2024-10-11T04:58:13Z
https://github.com/h2o/h2o/issues/3332
2,062,956,207
3,332
6,313
CVE-2024-9986
2024-10-15T13:15:11.790
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file member_register.php. The manipulation of the argument fullname/username/password/email leads to sql injection. The attack may be initiated remotely. The expl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/16" }, { "source": "cna@vuld...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# code-projects Blood Bank Management System In PHP With Source Code v1.0 member_register.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Blood Bank Management System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/blood-bank-management-system-in-php-with-source-code/ # AFFECTED AND/OR ...
code-projects Blood Bank Management System In PHP With Source Code v1.0 member_register.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/16/comments
0
2024-10-15T07:05:22Z
2024-10-15T07:05:22Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/16
2,587,845,882
16
6,314
CVE-2024-9486
2024-10-15T21:15:11.573
A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default credentials, and nodes using the resulting images may be accessible via these def...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "jordan@liggitt.net", "tags": [ "Patch" ], "url": "https://github.com/kubernetes-sigs/image-builder/pull/1595" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking" ], "url": "https://github.com/kubernetes/kubernetes/issues/128006" }, { "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:image_builder:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86E5438-1480-4C06-9A5E-C96F0756E07B", "versionEndExcluding": "0.1.38", "versionEndIncluding": null, "versionSt...
[ "798" ]
798
https://github.com/kubernetes/kubernetes/issues/128006
[ "Issue Tracking" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the image build process. Additionally, virtual machine image...
CVE-2024-9486: VM images built with Image Builder and Proxmox provider use default credentials
https://api.github.com/repos/kubernetes/kubernetes/issues/128006/comments
0
2024-10-11T18:04:31Z
2024-10-14T15:33:15Z
https://github.com/kubernetes/kubernetes/issues/128006
2,581,923,723
128,006
6,315
CVE-2024-9594
2024-10-15T21:15:11.790
A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Patch" ], "url": "https://github.com/kubernetes-sigs/image-builder/pull/1596" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking" ], "url": "https://github.com/kubernetes/kubernetes/issues/128007" }, { "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:image_builder:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86E5438-1480-4C06-9A5E-C96F0756E07B", "versionEndExcluding": "0.1.38", "versionEndIncluding": null, "versionSt...
[ "798" ]
798
https://github.com/kubernetes/kubernetes/issues/128007
[ "Issue Tracking" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H) A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or...
CVE-2024-9594: VM images built with Image Builder with some providers use default credentials during builds
https://api.github.com/repos/kubernetes/kubernetes/issues/128007/comments
0
2024-10-11T18:04:50Z
2024-10-14T15:33:22Z
https://github.com/kubernetes/kubernetes/issues/128007
2,581,924,154
128,007
6,316
CVE-2024-10141
2024-10-19T15:15:14.973
A vulnerability, which was classified as problematic, was found in jsbroks COCO Annotator 0.11.1. This affects an unknown part of the component Session Handler. The manipulation of the argument SECRET_KEY leads to predictable from observable state. It is possible to initiate the attack remotely. The complexity of an at...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jsbroks/coco-annotator/issues/626" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsbroks:coco_annotator:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "79DC05BD-A99B-4986-B494-7A79B0FBCD94", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "341" ]
341
https://github.com/jsbroks/coco-annotator/issues/626
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jsbroks", "coco-annotator" ]
The coco-annotator project has a default SECRET_KEY, which is used for signing and verifying Flask sessions. If the system administrator does not change the SECRET_KEY when configuring the system, it can lead to arbitrary session forgery by any user and gain administrative privileges. **Affected versions:** v0.11....
Default SECRET_KEY can lead to arbitrary session forgery
https://api.github.com/repos/jsbroks/coco-annotator/issues/626/comments
1
2024-10-12T03:10:44Z
2024-10-21T01:09:28Z
https://github.com/jsbroks/coco-annotator/issues/626
2,582,440,109
626
6,317
CVE-2024-10141
2024-10-19T15:15:14.973
A vulnerability, which was classified as problematic, was found in jsbroks COCO Annotator 0.11.1. This affects an unknown part of the component Session Handler. The manipulation of the argument SECRET_KEY leads to predictable from observable state. It is possible to initiate the attack remotely. The complexity of an at...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jsbroks/coco-annotator/issues/626" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsbroks:coco_annotator:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "79DC05BD-A99B-4986-B494-7A79B0FBCD94", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "341" ]
341
https://github.com/jsbroks/coco-annotator/issues/626#issue-2582440109
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jsbroks", "coco-annotator" ]
The coco-annotator project has a default SECRET_KEY, which is used for signing and verifying Flask sessions. If the system administrator does not change the SECRET_KEY when configuring the system, it can lead to arbitrary session forgery by any user and gain administrative privileges. **Affected versions:** v0.11....
Default SECRET_KEY can lead to arbitrary session forgery
https://api.github.com/repos/jsbroks/coco-annotator/issues/626/comments
1
2024-10-12T03:10:44Z
2024-10-21T01:09:28Z
https://github.com/jsbroks/coco-annotator/issues/626
2,582,440,109
626
6,318
CVE-2024-10165
2024-10-20T03:15:02.557
A vulnerability was found in Codezips Sales Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file deletecustcom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/14" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Sales Management System In PHP With Source Code 1.0 deletecustcom.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Sales Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/sales-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submit...
Codezips Sales Management System In PHP With Source Code 1.0 deletecustcom.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/14/comments
0
2024-10-17T13:58:54Z
2024-10-17T13:58:54Z
https://github.com/ppp-src/CVE/issues/14
2,594,837,568
14
6,319
CVE-2024-10166
2024-10-20T03:15:02.840
A vulnerability was found in Codezips Sales Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file checkuser.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the publi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/15" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.280952" }, { "source": "cna...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Sales Management System In PHP With Source Code 1.0 checkuser.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Sales Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/sales-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter ...
Codezips Sales Management System In PHP With Source Code 1.0 checkuser.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/15/comments
0
2024-10-17T14:27:36Z
2024-10-17T14:33:15Z
https://github.com/ppp-src/CVE/issues/15
2,594,911,630
15
6,320
CVE-2024-10167
2024-10-20T03:15:03.090
A vulnerability classified as critical has been found in Codezips Sales Management System 1.0. This affects an unknown part of the file deletecustind.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be u...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/16" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.280953" }, { "source": "cna...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Sales Management System In PHP With Source Code 1.0 deletecustind.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Sales Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/sales-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submit...
Codezips Sales Management System In PHP With Source Code 1.0 deletecustind.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/16/comments
0
2024-10-17T14:37:39Z
2024-10-17T14:37:39Z
https://github.com/ppp-src/CVE/issues/16
2,594,940,488
16
6,321
CVE-2024-10169
2024-10-20T04:15:02.600
A vulnerability classified as critical was found in code-projects Hospital Management System 1.0. This vulnerability affects unknown code of the file change-password.php. The manipulation of the argument cpass leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/RainFo666/cve/issues/1" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/RainFo666/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "RainFo666", "cve" ]
# code-projects Hospital Management System Using PHP With Source Code v1.0 change-password.php SQL injection # cpass OF AFFECTED PRODUCT(S) + Hospital Management System Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/hospital-management-system-using-php-source-code/ # AFFECTED AND/OR FIXE...
code-projects Hospital Management System Using PHP With Source Code v1.0 change-password.php SQL injection
https://api.github.com/repos/RainFo666/cve/issues/1/comments
0
2024-10-17T16:41:26Z
2024-10-19T06:56:44Z
https://github.com/RainFo666/cve/issues/1
2,595,234,197
1
6,322
CVE-2024-10173
2024-10-20T05:15:02.830
A vulnerability has been found in didi DDMQ 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Console Module. The manipulation with the input /;login leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/didi/DDMQ/issues/37" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:didiglobal:ddmq:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA66207A-D4D3-4B53-9922-7C3769E241F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "863" ]
863
https://github.com/didi/DDMQ/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "didi", "DDMQ" ]
In DDMQ console module through all the versions, a specially crafted request may cause an authentication bypass.Attackers can add “/;login” at the tail of authorization-required urls to bypass the authentication and retrieve sensitive information. ### **Proof of concept** ### **Step1:** we log into the system and b...
A specially crafted request may cause an authentication bypass
https://api.github.com/repos/didi/DDMQ/issues/37/comments
0
2024-10-10T07:27:44Z
2024-10-10T07:27:44Z
https://github.com/didi/DDMQ/issues/37
2,577,905,007
37
6,323
CVE-2024-10173
2024-10-20T05:15:02.830
A vulnerability has been found in didi DDMQ 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Console Module. The manipulation with the input /;login leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/didi/DDMQ/issues/37" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:didiglobal:ddmq:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA66207A-D4D3-4B53-9922-7C3769E241F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "863" ]
863
https://github.com/didi/DDMQ/issues/37#issue-2577905007
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "didi", "DDMQ" ]
In DDMQ console module through all the versions, a specially crafted request may cause an authentication bypass.Attackers can add “/;login” at the tail of authorization-required urls to bypass the authentication and retrieve sensitive information. ### **Proof of concept** ### **Step1:** we log into the system and b...
A specially crafted request may cause an authentication bypass
https://api.github.com/repos/didi/DDMQ/issues/37/comments
0
2024-10-10T07:27:44Z
2024-10-10T07:27:44Z
https://github.com/didi/DDMQ/issues/37
2,577,905,007
37
6,324
CVE-2024-9287
2024-10-22T17:15:06.697
A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual e...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7" }, { "source": "cna@python.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/commit/8450b2482586857d689b665...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "33E41245-604A-4967-85A8-F3DC04E6D0CC", "versionEndExcluding": "3.9.21", "versionEndIncluding": null, "versionStartExcludin...
[ "77" ]
77
https://github.com/python/cpython/issues/124651
[ "Issue Tracking" ]
github.com
[ "python", "cpython" ]
# Bug report ### Bug description: Crafted paths break the script templates: ```console envname='";uname -a;"' mkdir "$envname" cd "$envname" python3 -m venv . . ./bin/activate ``` ``` Linux archlinux 6.10.6-arch1-1 #1 SMP PREEMPT_DYNAMIC Mon, 19 Aug 2024 17:02:39 +0000 x86_64 GNU/Linux ``` Like p...
[CVE-2024-9287] `venv` activation scripts do not quote strings properly
https://api.github.com/repos/python/cpython/issues/124651/comments
9
2024-09-27T04:00:13Z
2024-12-13T15:42:25Z
https://github.com/python/cpython/issues/124651
2,551,940,669
124,651
6,325
CVE-2024-40493
2024-10-22T22:15:04.407
Null Pointer Dereference in `coap_client_exchange_blockwise2` function in Keith Cullen FreeCoAP 1.0 allows remote attackers to cause a denial of service and potentially execute arbitrary code via a specially crafted CoAP packet that causes `coap_msg_get_payload(resp)` to return a null pointer, which is then dereference...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/dqp10515/fe80005e2fb58ed8ada178ac017e4ad4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/keith-cullen/FreeCoAP/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keith-cullen:freecoap:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8787D78-015B-4E25-BBCB-B0748567705B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "476" ]
476
https://github.com/keith-cullen/FreeCoAP/issues/37
[ "Exploit", "Issue Tracking" ]
github.com
[ "keith-cullen", "FreeCoAP" ]
## Reproduce Info ### Build Environment Update The `Makefile` within the `test_coap_server` directory has been updated to utilize `clang` with sanitizers. ```diff I1 = ../../lib/include S1 = ../../lib/src -CC_ ?= gcc -CFLAGS = -Wall \ +CC_ ?= clang +CFLAGS = -Wall -g -fsanitize=address,undefined -fno-om...
Bug: Null Pointer Dereference Detected in coap_client.c at coap_client_exchange_blockwise2 Function
https://api.github.com/repos/keith-cullen/FreeCoAP/issues/37/comments
0
2024-05-12T08:00:22Z
2025-01-22T10:19:11Z
https://github.com/keith-cullen/FreeCoAP/issues/37
2,291,215,041
37
6,326
CVE-2024-48423
2024-10-24T21:15:14.143
An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the CallbackToLogRedirector function within the Assimp library.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/assimp/assimp/issues/5788" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "DD8EC697-A5C6-4066-9E02-9181B33F7428", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "416" ]
416
https://github.com/assimp/assimp/issues/5788
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "assimp", "assimp" ]
## Affected Projects assimp v5.4.3 (https://github.com/assimp/assimp) ## Problem Type CWE-122: Heap-based Buffer Overflow ## Decription ### Summary A heap-use-after-free (UAF) vulnerability has been identified in the `CallbackToLogRedirector` function within the Assimp library. This issue was discovered...
Bug:Use After Free in the `CallbackToLogRedirector `
https://api.github.com/repos/assimp/assimp/issues/5788/comments
1
2024-09-20T17:10:59Z
2024-12-11T10:17:15Z
https://github.com/assimp/assimp/issues/5788
2,539,271,300
5,788
6,327
CVE-2024-10350
2024-10-24T23:15:13.250
A vulnerability was found in code-projects Hospital Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/add-doctor.php. The manipulation of the argument docname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/RTio7/cve/issues/1" }, { "source": "cna@vuldb.com", "tag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/RTio7/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "RTio7", "cve" ]
# code-projects Hospital Management System Using PHP With Source Code v1.0 add-doctor.php SQL injection # docnameOF AFFECTED PRODUCT(S) + Hospital Management System Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/hospital-management-system-using-php-source-code/ # AFFECTED AND/OR FIXED VE...
code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection
https://api.github.com/repos/RTio7/cve/issues/1/comments
0
2024-10-21T12:31:55Z
2024-10-21T12:31:55Z
https://github.com/RTio7/cve/issues/1
2,602,408,251
1
6,328
CVE-2024-10368
2024-10-25T02:15:02.327
A vulnerability was found in Codezips Sales Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /addstock.php. The manipulation of the argument prodtype leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/17" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.281760" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Sales Management System In PHP With Source Code 1.0 addstock.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Sales Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/sales-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter ...
Codezips Sales Management System In PHP With Source Code 1.0 addstock.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/17/comments
0
2024-10-23T11:50:26Z
2024-10-23T11:50:26Z
https://github.com/ppp-src/CVE/issues/17
2,608,314,363
17
6,329
CVE-2024-10369
2024-10-25T02:15:02.613
A vulnerability was found in Codezips Sales Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /addcustcom.php. The manipulation of the argument refno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/18" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.281761" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/18
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Sales Management System In PHP With Source Code 1.0 addcustcom.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Sales Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/sales-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter...
Codezips Sales Management System In PHP With Source Code 1.0 addcustcom.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/18/comments
0
2024-10-23T11:53:23Z
2024-10-23T11:53:23Z
https://github.com/ppp-src/CVE/issues/18
2,608,324,409
18
6,330
CVE-2024-10370
2024-10-25T02:15:02.910
A vulnerability was found in Codezips Sales Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /addcustind.php. The manipulation of the argument refno leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the pu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/19" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.281762" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Sales Management System In PHP With Source Code 1.0 addcustind.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Sales Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/sales-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter...
Codezips Sales Management System In PHP With Source Code 1.0 addcustind.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/19/comments
0
2024-10-24T06:20:26Z
2024-10-24T06:20:26Z
https://github.com/ppp-src/CVE/issues/19
2,610,589,397
19
6,331
CVE-2024-10371
2024-10-25T02:15:03.280
A vulnerability classified as critical has been found in SourceCodester Payroll Management System 1.0. This affects the function login of the file main. The manipulation leads to buffer overflow. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/63" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:payroll_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "178D9197-399B-40EA-A85F-4CA99B806F85", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "120" ]
120
https://github.com/CveSecLook/cve/issues/63
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Payroll Management System in C++ with Source Code v1.0 - Buffer Overflow Author:shikang In the main program file, the vulnerability occurs in the login() function, where user input is handled using cin >> UserName;. The input is not properly bounded, allowing an attacker to enter more than the allocated buffer ...
Payroll Management System in C++ with Source Code v1.0 - Buffer Overflow
https://api.github.com/repos/CveSecLook/cve/issues/63/comments
0
2024-10-23T14:36:40Z
2024-10-23T14:36:40Z
https://github.com/CveSecLook/cve/issues/63
2,608,854,552
63
6,332
CVE-2024-48218
2024-10-25T21:15:03.603
Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/21" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability product: funadmin Vulnerability version: 5.0.2 Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip Vulnerability type: SQL injection Vulnerability details: Curd One Click Command Mode Funadmin\addons\curd\app\curd\controller\Table.php list SQL Injection Vulnerability ...
Funadmin v5.0.2 has 1 SQL injection in the/curd/table/list path
https://api.github.com/repos/funadmin/funadmin/issues/21/comments
1
2024-09-15T15:53:38Z
2025-04-23T05:57:49Z
https://github.com/funadmin/funadmin/issues/21
2,526,984,162
21
6,333
CVE-2024-48222
2024-10-25T21:15:03.680
Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/edit.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/22" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/22
[ "Exploit", "Third Party Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability product: funadmin Vulnerability version: 5.0.2 Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip Vulnerability type: SQL injection Vulnerability details: Curd One Click Command Mode Funadmin\addons\curd\app\curd\controller\Table.php edit SQL Injection Vulnerability ...
Funadmin v5.0.2 has 1 SQL injection in the/curd/table/edit path
https://api.github.com/repos/funadmin/funadmin/issues/22/comments
0
2024-09-15T16:38:41Z
2025-04-23T05:57:49Z
https://github.com/funadmin/funadmin/issues/22
2,527,016,778
22
6,334
CVE-2024-48223
2024-10-25T21:15:03.740
Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/fieldlist.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/23
[ "Exploit", "Third Party Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability product: funadmin Vulnerability version: 5.0.2 Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip Vulnerability type: SQL injection Vulnerability details: Curd One Click Command Mode Funadmin\addons\curd\app\curd\controller\Table.php fieldlist SQL Injection Vulnerabil...
Funadmin v5.0.2 has 1 SQL injection in the/curd/table/fieldlist path
https://api.github.com/repos/funadmin/funadmin/issues/23/comments
0
2024-09-15T17:00:51Z
2025-04-23T05:57:50Z
https://github.com/funadmin/funadmin/issues/23
2,527,032,932
23
6,335
CVE-2024-48224
2024-10-25T21:15:03.793
Funadmin v5.0.2 has an arbitrary file read vulnerability in /curd/index/editfile.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "22" ]
22
https://github.com/funadmin/funadmin/issues/24
[ "Exploit", "Third Party Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability product: funadmin Vulnerability version: 5.0.2 Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip Vulnerability type: Read any file Vulnerability details: Curd One Click Command Mode funadmin\app\curd\controller\Index.php editfile Read any file Install the Curd One C...
Funadmin v5.0.2 has an arbitrary file read in the/curd/index/editfile path
https://api.github.com/repos/funadmin/funadmin/issues/24/comments
0
2024-09-16T06:58:18Z
2025-04-23T05:57:50Z
https://github.com/funadmin/funadmin/issues/24
2,527,654,737
24
6,336
CVE-2024-48226
2024-10-25T21:15:03.953
Funadmin 5.0.2 is vulnerable to SQL Injection in curd/table/savefield.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/26
[ "Exploit", "Third Party Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability product: funadmin Vulnerability version: 5.0.2 Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip Vulnerability type: SQL injection Vulnerability details: Curd One Click Command Mode funadmin\app\curd\controller\Table.php savefield SQL Injection Vulnerability Install...
There is an SQL injection in the Curd one click command mode plugin
https://api.github.com/repos/funadmin/funadmin/issues/26/comments
0
2024-09-16T15:29:03Z
2025-04-23T05:57:51Z
https://github.com/funadmin/funadmin/issues/26
2,528,790,904
26
6,337
CVE-2024-48229
2024-10-25T21:15:04.063
funadmin 5.0.2 has a SQL injection vulnerability in the Curd one click command mode plugin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/28
[ "Third Party Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability product: funadmin Vulnerability version: 5.0.2 Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip Vulnerability type: SQL injection Vulnerability details: Curd One Click Command Mode funadmin\app\curd\controller\Index.php add SQL Injection Vulnerability Install the C...
There is an SQL injection in the Curd one click command mode plugin
https://api.github.com/repos/funadmin/funadmin/issues/28/comments
0
2024-09-17T09:03:24Z
2025-04-23T05:57:51Z
https://github.com/funadmin/funadmin/issues/28
2,530,492,781
28
6,338
CVE-2024-48230
2024-10-25T21:15:04.123
funadmin 5.0.2 is vulnerable to SQL Injection via the parentField parameter in the index method of \backend\controller\auth\Auth.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/30" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/30
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability product: funadmin Vulnerability version: 5.0.2 Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip Vulnerability type: SQL injection Vulnerability details: The parentField parameter in the index method of funadmin\app\backend\controller\auth\Auth.php has SQL injection ...
auth.Auth#parentField has sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/30/comments
0
2024-09-17T16:36:23Z
2025-04-23T05:57:52Z
https://github.com/funadmin/funadmin/issues/30
2,531,603,377
30
6,339
CVE-2020-26303
2024-10-26T21:15:13.460
insane is a whitelist-oriented HTML sanitizer. Versions 2.6.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bevacqua/insane/issues/19" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bevacqua:insane:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D2D5027-EF3C-48A6-A6EA-EAACA27F4542", "versionEndExcluding": null, "versionEndIncluding": "2.6.2", "versionStartExcludi...
[ "1333" ]
1333
https://github.com/bevacqua/insane/issues/19
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bevacqua", "insane" ]
Hello, The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose an...
Security Issue: Request for contact
https://api.github.com/repos/bevacqua/insane/issues/19/comments
2
2020-11-30T14:20:58Z
2021-03-01T15:41:31Z
https://github.com/bevacqua/insane/issues/19
753,518,672
19
6,340
CVE-2020-26304
2024-10-26T21:15:13.673
Foundation is a front-end framework. Versions 6.3.3 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any fixes are available.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/foundation/foundation-sites/issues/12180" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:foundation:foundation:*:*:*:*:*:*:*:*", "matchCriteriaId": "64B26903-4DBA-4F36-A148-42FA1B482F1A", "versionEndExcluding": null, "versionEndIncluding": "6.3.3", "versionStartE...
[ "1333" ]
1333
https://github.com/foundation/foundation-sites/issues/12180
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "foundation", "foundation-sites" ]
Hello, The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose an...
Security Issue: Request for contact
https://api.github.com/repos/foundation/foundation-sites/issues/12180/comments
3
2020-11-30T14:20:58Z
2025-02-27T05:57:03Z
https://github.com/foundation/foundation-sites/issues/12180
753,518,690
12,180
6,341
CVE-2020-26305
2024-10-26T21:15:13.783
CommonRegexJS is a CommonRegex port for JavaScript. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/talyssonoc/CommonRegexJS/issues/4" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:talyssonoc:commonregexjs:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "3DEB6AA1-B907-45A5-BDA9-F78DDE602124", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "1333" ]
1333
https://github.com/talyssonoc/CommonRegexJS/issues/4
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "talyssonoc", "CommonRegexJS" ]
Hello, The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose an...
Security Issue: Request for contact
https://api.github.com/repos/talyssonoc/CommonRegexJS/issues/4/comments
0
2020-11-30T14:20:59Z
2020-11-30T14:20:59Z
https://github.com/talyssonoc/CommonRegexJS/issues/4
753,518,703
4
6,342
CVE-2020-26311
2024-10-26T21:15:14.400
Useragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no patches are available.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/3rd-Eden/useragent/issues/167" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:useragent_project:useragent:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "BBA66A46-0609-4D7A-8CB6-B5EAA8E5BB0B", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "1333" ]
1333
https://github.com/3rd-Eden/useragent/issues/167
[ "Issue Tracking" ]
github.com
[ "3rd-Eden", "useragent" ]
Hello, The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose an...
Security Issue: Request for contact
https://api.github.com/repos/3rd-Eden/useragent/issues/167/comments
0
2020-11-30T14:21:15Z
2020-11-30T14:21:15Z
https://github.com/3rd-Eden/useragent/issues/167
753,518,919
167
6,343
CVE-2024-10412
2024-10-27T08:15:02.540
A vulnerability was found in Poco-z Guns-Medical 1.0. It has been declared as problematic. Affected by this vulnerability is the function upload of the file /mgr/upload of the component File Upload. The manipulation of the argument picture leads to cross site scripting. The attack can be launched remotely.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Poco-z/Guns-Medical/issues/15" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:poco-z:guns-medial:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "45C434BF-8FFD-44DF-A336-72968B8EE15A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/Poco-z/Guns-Medical/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Poco-z", "Guns-Medical" ]
**问题描述:**没有对文件类型进行验证,攻击者可以上传恶意文件 直接通过ToolUtil.getFileSuffix(picture.getOriginalFilename()) 保存原有后缀名 可上传恶意的html文件在访问时候触发xss **修复建议:** 校验文件上传的后缀 renderPicture 位置返回base64编码格式 如: const base64Image = "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAA..."; url: /mgr/upload 参数:file: picture ![image](https://github.com/user...
文件上传未过滤
https://api.github.com/repos/Poco-z/Guns-Medical/issues/15/comments
0
2024-10-20T03:02:52Z
2024-10-20T03:02:52Z
https://github.com/Poco-z/Guns-Medical/issues/15
2,599,884,324
15
6,344
CVE-2024-10426
2024-10-27T20:15:02.447
A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /animalsadd.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/21" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.281967" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pet Shop Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ##...
Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsadd.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/21/comments
0
2024-10-26T12:45:31Z
2024-10-26T12:45:32Z
https://github.com/ppp-src/CVE/issues/21
2,615,843,640
21
6,345
CVE-2024-10427
2024-10-27T20:15:02.743
A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /deleteanimal.php. The manipulation of the argument t1 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/ppp-src/CVE/issues/22" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.281968" }, { "source": "cna@vuldb.com"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/22
[ "Exploit" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Pet Shop Management System In PHP With Source Code V1.0 deleteanimal.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pet Shop Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ...
Codezips Pet Shop Management System In PHP With Source Code V1.0 deleteanimal.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/22/comments
0
2024-10-26T13:02:11Z
2024-10-26T13:02:11Z
https://github.com/ppp-src/CVE/issues/22
2,615,853,861
22
6,346
CVE-2024-50612
2024-10-27T22:15:03.613
libsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote out-of-bounds read.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libsndfile/libsndfile/issues/1035" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsndfile_project:libsndfile:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E71DB9F-FE9E-4369-8473-8D7B860D03DE", "versionEndExcluding": null, "versionEndIncluding": "1.2.2", "versi...
[ "125" ]
125
https://github.com/libsndfile/libsndfile/issues/1035
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libsndfile", "libsndfile" ]
## Description The latest version of libsndfile was discovered to contain a memory corruption vulnerability in ogg_vorbis.c:417 vorbis_analysis_wrote() when parsing a specially crafted input file. This vulnerability leads to Denial of Service (DoS). ## ASAN Log ```c Summary: CRASH detected in vorbis_analysis_wr...
Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote()
https://api.github.com/repos/libsndfile/libsndfile/issues/1035/comments
4
2024-08-29T05:44:12Z
2024-11-16T18:22:20Z
https://github.com/libsndfile/libsndfile/issues/1035
2,493,502,572
1,035
6,347
CVE-2024-50613
2024-10-27T22:15:03.660
libsndfile through 1.2.2 has a reachable assertion, that may lead to application exit, in mpeg_l3_encode.c mpeg_l3_encoder_close.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libsndfile/libsndfile/issues/1034" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsndfile_project:libsndfile:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E71DB9F-FE9E-4369-8473-8D7B860D03DE", "versionEndExcluding": null, "versionEndIncluding": "1.2.2", "versi...
[ "617" ]
617
https://github.com/libsndfile/libsndfile/issues/1034
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libsndfile", "libsndfile" ]
## Description The latest version of libsndfile was discovered to contain a reachable assertion vulnerability in mpeg_l3_encode.c:304 mpeg_l3_encoder_close() when parsing a specially crafted input file. This vulnerability can lead to Denial of Service (DoS). ## ASAN Log ```c Summary: CRASH detected in __pthread_...
Reachable assertion in mpeg_l3_encoder_close
https://api.github.com/repos/libsndfile/libsndfile/issues/1034/comments
2
2024-08-29T05:37:58Z
2025-01-09T18:31:00Z
https://github.com/libsndfile/libsndfile/issues/1034
2,493,495,453
1,034
6,348
CVE-2024-10430
2024-10-27T23:15:02.487
A vulnerability, which was classified as critical, has been found in Codezips Pet Shop Management System 1.0. This issue affects some unknown processing of the file /animalsupdate.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/23" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.281981" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/23
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsupdate.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pet Shop Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ...
Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsupdate.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/23/comments
0
2024-10-26T14:32:35Z
2024-10-26T14:32:35Z
https://github.com/ppp-src/CVE/issues/23
2,615,904,520
23
6,349
CVE-2024-10431
2024-10-27T23:15:02.747
A vulnerability, which was classified as critical, was found in Codezips Pet Shop Management System 1.0. Affected is an unknown function of the file /deletebird.php. The manipulation of the argument t1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/24" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.281982" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/24
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Pet Shop Management System In PHP With Source Code V1.0 deletebird.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pet Shop Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ##...
Codezips Pet Shop Management System In PHP With Source Code V1.0 deletebird.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/24/comments
0
2024-10-26T14:40:03Z
2024-10-26T14:40:03Z
https://github.com/ppp-src/CVE/issues/24
2,615,907,700
24
6,350
CVE-2024-10449
2024-10-28T15:15:04.303
A vulnerability, which was classified as critical, was found in Codezips Hospital Appointment System 1.0. This affects an unknown part of the file /loginAction.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/25" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.282009" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/25
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Hospital Appointment System In PHP With Source Code V1.0 loginAction.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Hospital Appointment System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S)...
Codezips Hospital Appointment System In PHP With Source Code V1.0 loginAction.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/25/comments
0
2024-10-27T14:58:29Z
2024-10-27T14:58:29Z
https://github.com/ppp-src/CVE/issues/25
2,616,657,283
25
6,351
CVE-2024-49769
2024-10-29T15:15:12.030
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removi...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Pylons/waitress/commit/1ae4e894c9f76543bee06584001583fc6fa8c95c" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/Pyl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:agendaless:waitress:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEED9ACE-30D9-4684-B15C-FABCE120401F", "versionEndExcluding": "3.0.1", "versionEndIncluding": null, "versionStartExc...
[ "772" ]
772
https://github.com/Pylons/waitress/issues/418
[ "Issue Tracking" ]
github.com
[ "Pylons", "waitress" ]
Following on from debugging in this issue - https://github.com/collective/haufe.requestmonitoring/issues/15 What we see is waitress switching into 100% CPU and staying there. It is happening in production randomly (within a week) and we haven't traced it back to a certain request). Using a sampling profiler on wa...
100% cpu in mainthread due to not closing properly? (channel.connected == False)
https://api.github.com/repos/Pylons/waitress/issues/418/comments
97
2023-09-11T10:49:57Z
2024-11-22T23:18:13Z
https://github.com/Pylons/waitress/issues/418
1,890,230,084
418
6,352
CVE-2024-10505
2024-10-30T02:15:02.430
A vulnerability was found in wuzhicms 4.1.0. It has been classified as critical. Affected is the function add/edit of the file www/coreframe/app/content/admin/block.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/209" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.282444" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "94" ]
94
https://github.com/wuzhicms/wuzhicms/issues/209
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
Source Code Developer: Beijing Wuzhi Internet Technology Co., Ltd Source code name:wuzhicms Source code version:4.1.0 Source code official website:http://www.wuzhicms.com/ Source code download link:https://github.com/wuzhicms/wuzhicms/archive/refs/tags/v4.1.0.zip Vulnerability description: The add method in the...
Wuzhims v4.1.0 has a getshell vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/209/comments
0
2024-10-21T02:26:39Z
2024-10-21T02:26:39Z
https://github.com/wuzhicms/wuzhicms/issues/209
2,601,116,580
209
6,353
CVE-2024-10507
2024-10-30T03:15:03.777
A vulnerability classified as critical was found in Codezips Free Exam Hall Seating Management System 1.0. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/26" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/26
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Free Exam Hall Seating Management System In PHP with Source Code ## Vendor Homepage + https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-source-code/ #...
Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 login.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/26/comments
0
2024-10-28T09:57:33Z
2024-10-28T09:57:33Z
https://github.com/ppp-src/CVE/issues/26
2,617,913,597
26
6,354
CVE-2024-10509
2024-10-30T03:15:04.060
A vulnerability, which was classified as critical, has been found in Codezips Online Institute Management System 1.0. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/27" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.282449" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/27
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Institute Management System In PHP MYSQL Secure Login Algorithm ## Vendor Homepage + https://codezips.com/php/online-institute-management-system-in-php-mysql-secure-l...
Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 login.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/27/comments
0
2024-10-28T10:00:00Z
2024-10-28T10:00:00Z
https://github.com/ppp-src/CVE/issues/27
2,617,919,905
27
6,355
CVE-2024-10556
2024-10-31T01:15:14.253
A vulnerability, which was classified as critical, was found in Codezips Pet Shop Management System 1.0. Affected is an unknown function of the file birdsadd.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and ma...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/28" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.282558" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/28
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pet Shop Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## s...
Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsadd.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/28/comments
0
2024-10-28T10:11:02Z
2024-10-28T10:12:46Z
https://github.com/ppp-src/CVE/issues/28
2,617,948,333
28
6,356
CVE-2024-10559
2024-10-31T02:15:03.370
A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical. Affected by this issue is the function details of the component Passport Number Handler. The manipulation leads to buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/64" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.282560" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:airport_booking_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "13A46EB4-EA63-4C05-A367-CB5D09C034C2", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "120" ]
120
https://github.com/CveSecLook/cve/issues/64
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Airport Booking Management System in C with Source Code v1.0 - Buffer Overflow Author: YANG HUA In the main program file, a buffer overflow vulnerability exists on line 73 due to the use of the unsafe function. This function is used to capture input for , but it does not limit the size of input, allowing an att...
Airport Booking Management System in C with Source Code v1.0 - Buffer Overflow
https://api.github.com/repos/CveSecLook/cve/issues/64/comments
0
2024-10-28T23:48:13Z
2024-10-28T23:48:13Z
https://github.com/CveSecLook/cve/issues/64
2,619,798,079
64
6,357
CVE-2024-10561
2024-10-31T02:15:03.680
A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file birdsupdate.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/29" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.282561" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/29
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsupdate.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pet Shop Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) #...
Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsupdate.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/29/comments
0
2024-10-30T09:25:51Z
2024-10-30T09:25:51Z
https://github.com/ppp-src/CVE/issues/29
2,623,400,797
29
6,358
CVE-2024-10607
2024-11-01T01:15:12.153
A vulnerability was found in code-projects Courier Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /track-result.php. The manipulation of the argument Consignment leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yanhuoshanjin/cve/issues/1" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:carmelogarcia:courier_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6A68C07-333F-4BBA-84AE-DB7B0FE774EC", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/yanhuoshanjin/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yanhuoshanjin", "cve" ]
# code-projects Courier Management System In PHP With Source Codee v1.0 track-result.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Restaurant Order System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/courier-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION...
code-projects Hospital Management System Using PHP With Source Code v1.0 user-login.php SQL injection
https://api.github.com/repos/yanhuoshanjin/cve/issues/1/comments
0
2024-10-29T13:57:09Z
2024-10-31T00:35:08Z
https://github.com/yanhuoshanjin/cve/issues/1
2,621,351,570
1
6,359
CVE-2024-10608
2024-11-01T01:15:12.430
A vulnerability was found in code-projects Courier Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument txtusername leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AXUyaku/cve/issues/1" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:carmelogarcia:courier_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6A68C07-333F-4BBA-84AE-DB7B0FE774EC", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/AXUyaku/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "AXUyaku", "cve" ]
# code-projects Courier Management System In PHP With Source Codee v1.0 login.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Restaurant Order System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/courier-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ##...
code-projects Courier Management System In PHP With Source Codee v1.0 login.php SQL injection
https://api.github.com/repos/AXUyaku/cve/issues/1/comments
0
2024-10-31T02:23:43Z
2024-10-31T02:23:44Z
https://github.com/AXUyaku/cve/issues/1
2,625,829,425
1
6,360
CVE-2024-10609
2024-11-01T01:15:12.690
A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System Project 1.0. This affects an unknown part of the file typeadd.php. The manipulation of the argument sex leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/17" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 typeadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-wit...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/17/comments
0
2024-10-31T04:48:37Z
2024-10-31T04:48:37Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/17
2,625,963,169
17
6,361
CVE-2024-51377
2024-11-01T16:15:09.400
An issue in Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 allows a remote attacker to execute arbitrary code via the Subject and Identifier fields
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Asadiqbal2/Vulnerabilities-Research/tree/main/CVE-2024-51377" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ladybird...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ladybirdweb:faveo_helpdesk:9.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "67170184-850D-4519-A864-A6552B8D2BA5", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "79" ]
79
https://github.com/ladybirdweb/faveo-helpdesk/issues/8303
[ "Exploit", "Issue Tracking" ]
github.com
[ "ladybirdweb", "faveo-helpdesk" ]
- Faveo Version : 9.2.0 - Product Name : Faveo Helpdesk & Servicedesk (On-Premise and Cloud) - Reported By : Asad Iqbal Link: https://github.com/Asadiqbal2 #### Description: Issue: The stored HTML payload when placed in the subject, identifier ,description of Problem gets executed after the Problem is created ...
Stored HTML Injection in Servicedesk Module
https://api.github.com/repos/faveosuite/faveo-helpdesk/issues/8303/comments
0
2024-10-03T10:08:36Z
2024-10-17T07:35:23Z
https://github.com/faveosuite/faveo-helpdesk/issues/8303
2,563,642,085
8,303
6,362
CVE-2024-10702
2024-11-02T18:15:03.363
A vulnerability classified as critical has been found in code-projects Simple Car Rental System 1.0. Affected is an unknown function of the file /signup.php. The manipulation of the argument fname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/imTedCao/cve/issues/1" }, { "source": "cna@vuldb.com", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabinros:simple_car_rental_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2AA148FF-0DFE-4194-B67D-37D10F6CE4F4", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "89" ]
89
https://github.com/imTedCao/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "imTedCao", "cve" ]
# code-projects Simple Car Rental System In PHP With Source Code v1.0 signup.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Restaurant Order System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/simple-car-rental-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## s...
code-projects Simple Car Rental System In PHP With Source Code v1.0 signup.php SQL injection
https://api.github.com/repos/imTedCao/cve/issues/1/comments
0
2024-11-01T01:28:01Z
2024-11-01T01:29:20Z
https://github.com/imTedCao/cve/issues/1
2,628,116,295
1
6,363
CVE-2024-10733
2024-11-03T12:15:12.780
A vulnerability was found in code-projects Restaurant Order System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument uid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/415Curry/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Re...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:carmelogarcia:restaurant_order_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F9426DA-473A-44DC-BD03-A941FF6CFC8F", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/415Curry/cve/issues/1
[ "Exploit" ]
github.com
[ "415Curry", "cve" ]
# code-projects Restaurant Order System In PHP With Source Code v1.0 login.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Restaurant Order System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/restaurant-order-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## subm...
code-projects Restaurant Order System In PHP With Source Code v1.0 login.php SQL injection
https://api.github.com/repos/415Curry/cve/issues/1/comments
0
2024-11-01T01:39:00Z
2024-11-01T01:39:01Z
https://github.com/415Curry/cve/issues/1
2,628,128,246
1
6,364
CVE-2024-10736
2024-11-03T15:15:03.113
A vulnerability was found in Codezips Free Exam Hall Seating Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /student.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/EddieAy/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.282905" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "89" ]
89
https://github.com/EddieAy/cve/issues/3
[ "Exploit" ]
github.com
[ "EddieAy", "cve" ]
# Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 student.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Free Exam Hall Seating Management System In PHP with Source Code ## Vendor Homepage + https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-source-code/ ...
Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 student.php SQL injection
https://api.github.com/repos/EddieAy/cve/issues/3/comments
0
2024-11-01T09:26:19Z
2025-02-09T12:51:21Z
https://github.com/EddieAy/cve/issues/3
2,628,678,865
3
6,365
CVE-2024-10737
2024-11-03T15:15:03.367
A vulnerability classified as critical has been found in Codezips Free Exam Hall Seating Management System 1.0. Affected is an unknown function of the file /teacher.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Scholar-XD/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.282906" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "89" ]
89
https://github.com/Scholar-XD/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Scholar-XD", "CVE" ]
# Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 teacher.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Free Exam Hall Seating Management System In PHP with Source Code ## Vendor Homepage + https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-source-code/ ...
Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 teacher.php SQL injection
https://api.github.com/repos/Scholar-XD/CVE/issues/1/comments
0
2024-11-01T12:27:39Z
2024-11-01T12:27:40Z
https://github.com/Scholar-XD/CVE/issues/1
2,628,943,288
1
6,366
CVE-2024-10738
2024-11-03T17:15:12.803
A vulnerability classified as critical was found in itsourcecode Farm Management System 1.0. Affected by this vulnerability is an unknown functionality of the file manage-breed.php. The manipulation of the argument breed leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Nightmaremassacre/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags": [ "Permis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Nightmaremassacre/cve/issues/3
[ "Exploit" ]
github.com
[ "Nightmaremassacre", "cve" ]
# Itsourcecode Farm Management System In PHP v1.0 manage-breed.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Farm Management System In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter +...
Itsourcecode Farm Management System In PHP v1.0 manage-breed.php SQL injection
https://api.github.com/repos/Nightmaremassacre/cve/issues/3/comments
0
2024-11-01T14:54:26Z
2024-11-01T14:54:26Z
https://github.com/Nightmaremassacre/cve/issues/3
2,629,206,336
3
6,367
CVE-2024-10751
2024-11-04T02:15:14.993
A vulnerability was found in Codezips ISP Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file pay.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and ma...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/JiangJiangCC/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.282920" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:isp_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FF6890C-7A61-46EA-AF5D-FAB569F6DAD2", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/JiangJiangCC/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "JiangJiangCC", "CVE" ]
# Codezips ISP Management System In PHP With Source Code V1.0 pay.php SQL injection # NAME OF AFFECTED PRODUCT(S) + ISP Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/isp-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Cuit_jia...
Codezips ISP Management System In PHP With Source Code V1.0 pay.php SQL injection
https://api.github.com/repos/JiangJiangCC/CVE/issues/1/comments
0
2024-11-02T14:09:06Z
2024-11-02T14:09:06Z
https://github.com/JiangJiangCC/CVE/issues/1
2,630,478,284
1
6,368
CVE-2024-10752
2024-11-04T02:15:15.310
A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /productsadd.php. The manipulation of the argument id/name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the publ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/primaryboy/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.282921" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/primaryboy/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "primaryboy", "CVE" ]
# Codezips Pet Shop Management System In PHP With Source Code V1.0 productupdate.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pet Shop Management System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ...
Codezips Pet Shop Management System In PHP With Source Code V1.0 productupdate.php SQL injection
https://api.github.com/repos/primaryboy/CVE/issues/1/comments
0
2024-11-02T16:44:02Z
2024-11-02T16:46:12Z
https://github.com/primaryboy/CVE/issues/1
2,630,607,486
1
6,369
CVE-2024-10759
2024-11-04T04:15:03.273
A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /edit-pig.php. The manipulation of the argument pigno/weight/arrived/breed/remark/status leads to sql injection. The attack can be initiated remotely. The exploit has...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/liujiaquan1122/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/liujiaquan1122/cve/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "liujiaquan1122", "cve" ]
# Itsourcecode Farm Management System In PHP v1.0 edit-pig.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Farm Management System In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + liu...
Itsourcecode Farm Management System In PHP v1.0 edit-pig.php SQL injection
https://api.github.com/repos/liujiaquan1122/cve/issues/2/comments
0
2024-11-03T02:26:35Z
2024-11-03T02:26:35Z
https://github.com/liujiaquan1122/cve/issues/2
2,630,917,700
2
6,370
CVE-2024-10764
2024-11-04T16:15:04.497
A vulnerability classified as critical has been found in Codezips Online Institute Management System 1.0. This affects an unknown part of the file /pages/save_user.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaobsss/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.28295...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/xiaobsss/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xiaobsss", "CVE" ]
# Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 /pages/save_user.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Institute Management System In PHP MYSQL Secure Login Algorithm ## Vendor Homepage + https://codezips.com/php/online-institute-management-system-in-ph...
Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 /pages/save_user.php Unrestricted Upload
https://api.github.com/repos/xiaobsss/CVE/issues/1/comments
0
2024-11-02T19:11:52Z
2024-11-02T19:11:52Z
https://github.com/xiaobsss/CVE/issues/1
2,630,725,456
1
6,371
CVE-2024-10765
2024-11-04T16:15:04.890
A vulnerability classified as critical was found in Codezips Online Institute Management System up to 1.0. This vulnerability affects unknown code of the file /profile.php. The manipulation of the argument old_image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hbuzs/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.282952" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/hbuzs/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hbuzs", "CVE" ]
# Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 profile.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Institute Management System In PHP MYSQL Secure Login Algorithm ## Vendor Homepage + https://codezips.com/php/online-institute-management-system-in-php-mysql-s...
Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 profile.php Unrestricted Upload
https://api.github.com/repos/hbuzs/CVE/issues/1/comments
0
2024-11-03T10:19:30Z
2024-11-03T10:19:30Z
https://github.com/hbuzs/CVE/issues/1
2,631,112,660
1
6,372
CVE-2024-48809
2024-11-04T17:15:07.880
An issue in Open Networking Foundations sdran-in-a-box v.1.4.3 and onos-a1t v.0.2.3 allows a remote attacker to cause a denial of service via the onos-a1t component of the sdran-in-a-box, specifically the DeleteWatcher function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/bergen876/5a21f78e266c12aa2586beb2178443b0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/onosproject/sdran-in-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:aetherproject:onos-a1t:0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8194B2E5-8575-4F0C-9350-6FA565F35216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "770" ]
770
https://github.com/onosproject/sdran-in-a-box/issues/206
[ "Exploit", "Issue Tracking" ]
github.com
[ "onosproject", "sdran-in-a-box" ]
**Issue Summary –** Issue: Our tests revealed that the ONOS A1 Termination component of SD RAN ORAN deployment was susceptible to a Denial of Service attack through the continuous replay of concurrent HTTP policies. This attack resulted in the termination of the service, impacting the management of A1 policies. ...
Logic Flaw in Delete Watcher Function | Improper Closure | A1T DoS
https://api.github.com/repos/onosproject/sdran-in-a-box/issues/206/comments
3
2024-10-03T18:16:54Z
2025-02-25T21:41:54Z
https://github.com/onosproject/sdran-in-a-box/issues/206
2,564,699,605
206
6,373
CVE-2024-51136
2024-11-04T17:15:08.050
An XML External Entity (XXE) vulnerability in Dmoz2CSV in openimaj v1.3.10 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted XML file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/openimaj/openimaj" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/openimaj/openimaj/issues/382" }, { "source": "cve@mitre.org", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openimaj:openimaj:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "AAF734DE-88E3-455D-A60A-FD00CC6CA12B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "611" ]
611
https://github.com/openimaj/openimaj/issues/382
[ "Exploit" ]
github.com
[ "openimaj", "openimaj" ]
Hi team, A XXE vulnerability might be exploited when Dmoz2CSV (one of WebTools) is used by users The xml parser does not enable security settings or disable external entities loading: ![image](https://github.com/user-attachments/assets/42876a9b-0219-4618-8307-6259593f45a4) When a malicious xml file passed in,...
Potential XXE(XML External Entity Injection) exists in Dmoz2CSV
https://api.github.com/repos/openimaj/openimaj/issues/382/comments
0
2024-10-22T03:03:02Z
2024-11-04T21:21:57Z
https://github.com/openimaj/openimaj/issues/382
2,604,099,096
382
6,374
CVE-2024-10766
2024-11-04T18:15:04.330
A vulnerability, which was classified as critical, has been found in Codezips Free Exam Hall Seating Management System 1.0. This issue affects some unknown processing of the file /pages/save_user.php. The manipulation of the argument image leads to unrestricted upload. The attack may be initiated remotely. The exploit ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Charlotte008/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "434" ]
434
https://github.com/Charlotte008/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Charlotte008", "cve" ]
# Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 update-image1.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Free Exam Hall Seating Management System In PHP with Source Code ## Vendor Homepage + https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-so...
Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 /pages/save_user.php Unrestricted Upload
https://api.github.com/repos/Charlotte008/cve/issues/3/comments
0
2024-11-03T07:51:11Z
2024-11-03T07:58:03Z
https://github.com/Charlotte008/cve/issues/3
2,631,043,060
3
6,375
CVE-2024-10791
2024-11-04T20:15:04.580
A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /doctorAction.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/3127434/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.282989" }, { "source": "cna@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/3127434/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "3127434", "CVE" ]
# Codezips Hospital Appointment System In PHP With Source Code V1.0 docterAction.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Hospital Appointment System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S...
Codezips Hospital Appointment System In PHP With Source Code V1.0 docterAction.php SQL injection
https://api.github.com/repos/3127434/CVE/issues/2/comments
0
2024-11-03T13:50:19Z
2024-11-03T13:50:19Z
https://github.com/3127434/CVE/issues/2
2,631,221,155
2
6,376
CVE-2024-10844
2024-11-05T15:15:22.337
A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file search.php. The manipulation of the argument s leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sbm-98/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.283089" }, { "source": "cna@v...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10", "versionEndExcluding": null, "versionEndInc...
[ "89" ]
89
https://github.com/sbm-98/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sbm-98", "CVE" ]
# 100projects Bookstore Management System PHP MySQL Project V1.0 search.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bookstore Management System PHP MySQL Project ## Vendor Homepage + https://1000projects.org/bookstore-management-system-php-mysql-project.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter ...
100projects Bookstore Management System PHP MySQL Project V1.0 search.php SQL injection
https://api.github.com/repos/sbm-98/CVE/issues/1/comments
0
2024-11-04T14:21:06Z
2024-11-04T14:21:06Z
https://github.com/sbm-98/CVE/issues/1
2,632,953,511
1
6,377
CVE-2024-10845
2024-11-05T15:15:22.620
A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file book_detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hbuzs/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.283090" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10", "versionEndExcluding": null, "versionEndInc...
[ "89" ]
89
https://github.com/hbuzs/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hbuzs", "CVE" ]
# 100projects Bookstore Management System PHP MySQL Project V1.0 book_detail.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bookstore Management System PHP MySQL Project ## Vendor Homepage + https://1000projects.org/bookstore-management-system-php-mysql-project.html # AFFECTED AND/OR FIXED VERSION(S) ## submit...
100projects Bookstore Management System PHP MySQL Project V1.0 book_detail.php SQL injection
https://api.github.com/repos/hbuzs/CVE/issues/3/comments
0
2024-11-04T14:34:50Z
2024-11-04T14:49:02Z
https://github.com/hbuzs/CVE/issues/3
2,632,986,390
3
6,378
CVE-2024-10919
2024-11-06T16:15:05.610
A vulnerability has been found in didi Super-Jacoco 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /cov/triggerUnitCover. The manipulation of the argument uuid leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/didi/super-jacoco/issues/49" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:didi:super-jacoco:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FE5CE81-6250-439C-B811-B6068786FAD6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "78" ]
78
https://github.com/didi/super-jacoco/issues/49
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "didi", "super-jacoco" ]
When accessing the triggerUnitCover Interface with special request, unauthorized attackers can execute any command on the target system. Attacker can inject command in the parameter uuid. ### Proof of concept: **The request with file creation and results are as following.** After sending the payload, wait for a p...
Unauthorized attackers can execute any command with triggerUnitCover Interface
https://api.github.com/repos/didi/super-jacoco/issues/49/comments
0
2024-10-28T06:42:55Z
2024-10-28T06:42:55Z
https://github.com/didi/super-jacoco/issues/49
2,617,470,201
49
6,379
CVE-2024-10920
2024-11-06T16:15:05.930
A vulnerability was found in mariazevedo88 travels-java-api up to 5.0.1 and classified as problematic. Affected by this issue is the function doFilterInternal of the file travels-java-api-master\src\main\java\io\github\mariazevedo88\travelsjavaapi\filters\JwtAuthenticationTokenFilter.java of the component JWT Secret Ha...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mariazevedo88/travels-java-api/issues/23" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.283316" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mariazevedo88:travels-java-api:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA8D4957-2DFF-4D2D-9BE0-1D7EE3E5C60F", "versionEndExcluding": null, "versionEndIncluding": "5.0.1", "vers...
[ "798" ]
798
https://github.com/mariazevedo88/travels-java-api/issues/23
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mariazevedo88", "travels-java-api" ]
**Description:** Hardcoding the JWT secret key can lead to arbitrary users spoofing tokens. Since the travels-java-api is an open-source project, others can easily obtain the JWT secret key of travels-java-api. This allows them to use the JWT secret key to generate arbitrary JWT tokens and gain access to any user's per...
Hardcoding the JWT secret key can lead to arbitrary users spoofing tokens.
https://api.github.com/repos/mariazevedo88/travels-java-api/issues/23/comments
0
2024-10-29T07:35:29Z
2024-10-29T07:35:29Z
https://github.com/mariazevedo88/travels-java-api/issues/23
2,620,405,553
23
6,380
CVE-2024-10964
2024-11-07T17:15:06.500
A vulnerability classified as critical has been found in emqx neuron up to 2.10.0. Affected is the function handle_add_plugin in the library cmd.library of the file plugins/restful/plugin_handle.c. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. It is recommended to apply a patc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/emqx/neuron/issues/2280" }, { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/emqx/neuron/pull/2286" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:neuron:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3F83EB1-2071-47DC-9382-73C637394004", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartExcluding"...
[ "120" ]
120
https://github.com/emqx/neuron/issues/2280
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "emqx", "neuron" ]
**Buffer Overflow in strcpy(1) handle_add_plugin** File: plugins/restful/plugin_handle.c The /api/v2/plugin interface library parameter uses the strcpy function to copy the contents of req->library to cmd.library. This operation poses a risk of buffer overflow since the strcpy function does not check the size of th...
Buffer Overflow in strcpy(1) handle_add_plugin
https://api.github.com/repos/emqx/neuron/issues/2280/comments
0
2024-11-01T06:07:27Z
2024-11-05T01:51:29Z
https://github.com/emqx/neuron/issues/2280
2,628,400,071
2,280
6,381
CVE-2024-10968
2024-11-07T20:15:15.633
A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /contact_process.php. The manipulation of the argument fnm leads to sql injection. The attack can be launched remotely. The exploit has bee...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NG0324/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.283417" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/NG0324/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NG0324", "CVE" ]
# 100projects Bookstore Management System PHP MySQL Project V1.0 contact_process.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bookstore Management System PHP MySQL Project ## Vendor Homepage + https://1000projects.org/bookstore-management-system-php-mysql-project.html # AFFECTED AND/OR FIXED VERSION(S) ## su...
100projects Bookstore Management System PHP MySQL Project V1.0 contact_process.php SQL injection
https://api.github.com/repos/NG0324/CVE/issues/1/comments
0
2024-11-05T04:51:22Z
2024-11-05T04:51:23Z
https://github.com/NG0324/CVE/issues/1
2,634,411,874
1
6,383
CVE-2024-10969
2024-11-07T20:15:15.930
A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login_process.php of the component Login. The manipulation of the argument unm leads to sql injection. The attack may be launched remotely. T...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/31" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.283418" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/31
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# 100projects Bookstore Management System PHP MySQL Project V1.0 admin/login_process.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bookstore Management System PHP MySQL Project ## Vendor Homepage + https://1000projects.org/bookstore-management-system-php-mysql-project.html # AFFECTED AND/OR FIXED VERSION(S) #...
100projects Bookstore Management System PHP MySQL Project V1.0 admin/login_process.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/31/comments
0
2024-11-05T09:18:12Z
2024-11-05T09:18:12Z
https://github.com/ppp-src/CVE/issues/31
2,634,881,140
31
6,384
CVE-2024-10991
2024-11-08T05:15:06.127
A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /editBranchResult.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/30" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# Codezips Hospital Appointment System In PHP With Source Code V1.0 editBranchResult.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Hospital Appointment System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSI...
Codezips Hospital Appointment System In PHP With Source Code V1.0 editBranchResult.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/30/comments
0
2024-11-05T08:32:12Z
2024-11-05T08:32:12Z
https://github.com/ppp-src/CVE/issues/30
2,634,772,456
30
6,385
CVE-2024-10993
2024-11-08T06:15:14.243
A vulnerability, which was classified as critical, was found in Codezips Online Institute Management System 1.0. Affected is an unknown function of the file /manage_website.php. The manipulation of the argument website_image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has bee...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NG0324/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/NG0324/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NG0324", "CVE" ]
# Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 manage_website.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Institute Management System In PHP MYSQL Secure Login Algorithm ## Vendor Homepage + https://codezips.com/php/online-institute-management-system-in-php-...
Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 manage_website.php Unrestricted
https://api.github.com/repos/NG0324/CVE/issues/2/comments
0
2024-11-05T08:46:53Z
2024-11-05T08:46:53Z
https://github.com/NG0324/CVE/issues/2
2,634,809,001
2
6,386
CVE-2024-10994
2024-11-08T06:15:14.540
A vulnerability has been found in Codezips Online Institute Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /edit_user.php. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/Hacker0xone/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 edit_user.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Institute Management System In PHP MYSQL Secure Login Algorithm ## Vendor Homepage + https://codezips.com/php/online-institute-management-system-in-php-mysql...
Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 edit_user.php Unrestricted Upload
https://api.github.com/repos/Hacker0xOne/CVE/issues/1/comments
0
2024-11-06T15:07:22Z
2024-11-06T15:07:22Z
https://github.com/Hacker0xOne/CVE/issues/1
2,638,367,527
1
6,387
CVE-2024-10995
2024-11-08T07:15:07.263
A vulnerability was found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /removeDoctorResult.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# Codezips Hospital Appointment System In PHP With Source Code V1.0 removeDoctorResult.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Hospital Appointment System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VER...
Codezips Hospital Appointment System In PHP With Source Code V1.0 removeDoctorResult.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/2/comments
0
2024-11-06T15:40:03Z
2024-11-06T15:40:03Z
https://github.com/Hacker0xOne/CVE/issues/2
2,638,469,394
2
6,388
CVE-2024-10996
2024-11-08T07:15:08.117
A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/process_category_edit.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been dis...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/32" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10", "versionEndExcluding": null, "versionEndInc...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/32
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# 100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_edit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bookstore Management System PHP MySQL Project ## Vendor Homepage + https://1000projects.org/bookstore-management-system-php-mysql-project.html # AFFECTED AND/OR FIXED VERSI...
100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_edit.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/32/comments
0
2024-11-06T03:15:37Z
2024-11-06T03:15:37Z
https://github.com/ppp-src/CVE/issues/32
2,636,925,748
32
6,389
CVE-2024-10998
2024-11-08T08:15:12.913
A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/process_category_add.php. The manipulation of the argument cat leads to sql injection. The attack may be initiated remotely. The exploit has been discl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/090913/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10", "versionEndExcluding": null, "versionEndInc...
[ "89" ]
89
https://github.com/090913/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "090913", "CVE" ]
# 100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_add.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bookstore Management System PHP MySQL Project ## Vendor Homepage + https://1000projects.org/bookstore-management-system-php-mysql-project.html # AFFECTED AND/OR FIXED VERSIO...
100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_add.php SQL injection
https://api.github.com/repos/090913/CVE/issues/1/comments
0
2024-11-06T14:52:11Z
2024-11-06T14:52:11Z
https://github.com/090913/CVE/issues/1
2,638,319,792
1
6,390
CVE-2024-25431
2024-11-08T17:15:06.023
An issue in bytecodealliance wasm-micro-runtime before v.b3f728c and fixed in commit 06df58f allows a remote attacker to escalate privileges via a crafted file to the check_was_abi_compatibility function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/haruki3hhh/bd228e6dcaf8c18140e1074964912b39" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/bytecodealliance/wasm-micro-r...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bytecodealliance:webassembly_micro_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5C4A095-7C30-4027-B83A-DC6C72967FD2", "versionEndExcluding": "1.3.2", "versionEndIncluding": null, ...
[ "125" ]
125
https://github.com/bytecodealliance/wasm-micro-runtime/issues/3122
[ "Exploit", "Patch" ]
github.com
[ "bytecodealliance", "wasm-micro-runtime" ]
## Version commit b3f728ceb36f9c72047a934436ef41699643ab99 (HEAD -> main, origin/main, origin/HEAD) Author: Wenyong Huang <wenyong.huang@intel.com> Date: Thu Feb 1 12:42:12 2024 +0800 ## Compile ```sh cd wasm-micro-runtime/product-mini/platforms/linux/ cmake -DCMAKE_C_COMPILER="gcc" -DCMAKE_C_FLAGS="-g -fsan...
Invalid Read Memory in check_wasi_abi_compatibility
https://api.github.com/repos/bytecodealliance/wasm-micro-runtime/issues/3122/comments
2
2024-02-03T03:14:15Z
2024-03-15T05:48:21Z
https://github.com/bytecodealliance/wasm-micro-runtime/issues/3122
2,116,146,074
3,122
6,391
CVE-2024-11055
2024-11-10T15:15:13.970
A vulnerability, which was classified as critical, has been found in 1000 Projects Beauty Parlour Management System 1.0. This issue affects some unknown processing of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection. The attack may be initiated remotely. The exploit h...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/3" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/admin-profile.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR ...
100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/admin-profile.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/3/comments
0
2024-11-08T01:35:06Z
2024-11-08T01:35:06Z
https://github.com/Hacker0xOne/CVE/issues/3
2,642,596,551
3
6,392
CVE-2024-11057
2024-11-10T18:15:16.517
A vulnerability has been found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /removeBranchResult.php. The manipulation of the argument ID/Name leads to sql injection. The attack can be launched remotely. The exploit has bee...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.283801" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/4
[ "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# Codezips Hospital Appointment System In PHP With Source Code V1.0 removeBranchResult.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Hospital Appointment System In PHP With Source Code ## Vendor Homepage + https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VER...
Codezips Hospital Appointment System In PHP With Source Code V1.0 removeBranchResult.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/4/comments
0
2024-11-08T04:18:51Z
2024-11-08T04:18:52Z
https://github.com/Hacker0xOne/CVE/issues/4
2,642,795,118
4
6,393
CVE-2024-46613
2024-11-10T21:15:14.790
WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at core/core-string.c when there are more than two billion items in a list. This affects string_free_split_shared , string_free_split, string_free_split_command, and string_free_split_tags.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weechat/weechat/issues/2178" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://weechat.org/doc/weechat/security/WSA-2024-1/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:weechat:weechat:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA1A31BC-F7D9-41D0-A7FB-1EE3A5F33C0A", "versionEndExcluding": "4.4.2", "versionEndIncluding": null, "versionStartExcludi...
[ "190" ]
190
https://github.com/weechat/weechat/issues/2178
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weechat", "weechat" ]
### Question Hi, we have detected that your project may be vulnerable to Integer Overflow to Buffer Overflow in the function of `string_free_split_shared `, `string_free_split`, `string_free_split_command` and `string_free_split_tags` in the file of `src/core/core-string.c` . It shares similarities to a recent CV...
Integer Overflow to Buffer Overflow vulnerability in "string_free_split" functions
https://api.github.com/repos/weechat/weechat/issues/2178/comments
15
2024-09-03T08:50:53Z
2024-12-24T13:06:18Z
https://github.com/weechat/weechat/issues/2178
2,502,293,887
2,178
6,394
CVE-2024-11074
2024-11-11T18:15:14.620
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file /incadd.php. The manipulation of the argument inccat/desc/date/amount leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dimongshi/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/dimongshi/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "dimongshi", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 incadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 incadd.php SQL injection
https://api.github.com/repos/dimongshi/cve/issues/1/comments
0
2024-11-11T02:14:06Z
2024-11-11T02:14:06Z
https://github.com/dimongshi/cve/issues/1
2,647,926,424
1
6,395
CVE-2024-11097
2024-11-12T02:15:17.817
A vulnerability has been found in SourceCodester Student Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the component Main Menu. The manipulation leads to infinite loop. Attacking locally is a requirement. The exploit has been disclosed to the public and may be us...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.283918" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "835" ]
835
https://github.com/Hacker0xone/CVE/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# **SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Buffer Pollution Vulnerability** ## **Vulnerability Name** + **Input Buffer Pollution Vulnerability** --- ## **Vulnerability Description** In the Student Record Management System program, there is an issue with input b...
SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Buffer Pollution Vulnerability
https://api.github.com/repos/Hacker0xOne/CVE/issues/5/comments
0
2024-11-11T04:53:37Z
2024-11-11T04:53:37Z
https://github.com/Hacker0xOne/CVE/issues/5
2,648,153,926
5
6,396
CVE-2024-11100
2024-11-12T04:15:04.823
A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been di...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/6" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 100projects Beauty Parlour Management System PHP SQLite Project V1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR FIXED VERSION(S...
100projects Beauty Parlour Management System PHP SQLite Project V1.0 index.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/6/comments
0
2024-11-11T06:35:51Z
2024-11-11T06:35:51Z
https://github.com/Hacker0xOne/CVE/issues/6
2,648,315,746
6
6,397
CVE-2024-11101
2024-11-12T04:15:05.080
A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/search-invoices.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/7" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-invoices.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/O...
100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-invoices.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/7/comments
0
2024-11-11T06:42:21Z
2024-11-11T06:42:21Z
https://github.com/Hacker0xOne/CVE/issues/7
2,648,326,184
7
6,398