cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-9291 | 2024-09-27T21:15:03.667 | A vulnerability classified as problematic has been found in kalvinGit kvf-admin up to f12a94dc1ebb7d1c51ee978a85e4c7ed75c620ff. Affected is an unknown function of the file /ueditor/upload?configPath=ueditor/config.json&action=uploadfile of the component XML File Handler. The manipulation of the argument upfile leads to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/daxiangya/kvf-admin/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/user-attachments/files/17058501/kvf-admin_xss.md"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kvf-admin_project:kvf-admin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2664551A-27E9-4D70-A84A-DA72BD4CF6C7",
"versionEndExcluding": null,
"versionEndIncluding": "2022-02-12",
"ve... | [
"79"
] | 79 | https://github.com/daxiangya/kvf-admin/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"daxiangya",
"kvf-admin"
] | [kvf-admin_xss.md](https://github.com/user-attachments/files/17058501/kvf-admin_xss.md)
| kvf-admin_xss. | https://api.github.com/repos/daxiangya/kvf-admin/issues/1/comments | 0 | 2024-09-19T11:50:21Z | 2024-10-24T01:03:21Z | https://github.com/daxiangya/kvf-admin/issues/1 | 2,536,115,662 | 1 | 6,298 |
CVE-2024-9315 | 2024-09-28T19:15:12.353 | A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_department.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/zonesec0/findcve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.278819"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B",
"versionEndExcluding": null,
"versionEndIncluding":... | [
"89"
] | 89 | https://github.com/zonesec0/findcve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"zonesec0",
"findcve"
] | # Description
The system Employee and Visitor Gate Pass Logging 1.0 is vulnerable to SQL Injection. The parameter id is not sanitized correctly. Attackers can exploit this vulnerability to gain database privileges.
# Vendor Homepage
https://www.sourcecodester.com/php/15026/employee-and-visitor-gate-pass-logging-s... | SourceCodester Employee and Visitor Gate Pass Logging System 1.0 manage_department.php id sql injection | https://api.github.com/repos/zonesec0/findcve/issues/3/comments | 0 | 2024-09-23T15:26:19Z | 2024-09-23T15:26:19Z | https://github.com/zonesec0/findcve/issues/3 | 2,543,000,878 | 3 | 6,299 |
CVE-2024-9359 | 2024-10-01T02:15:10.657 | A vulnerability was found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /addcompany.php. The manipulation of the argument company leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/22"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/22 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "addcompany.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-s... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "addcompany.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/22/comments | 0 | 2024-09-30T15:13:18Z | 2024-09-30T15:13:18Z | https://github.com/ppp-src/a/issues/22 | 2,556,974,748 | 22 | 6,300 |
CVE-2024-9360 | 2024-10-01T03:15:02.690 | A vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been classified as critical. This affects an unknown part of the file /updatebal.php. The manipulation of the argument company leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/halhalz/-/issues/1"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/halhalz/-/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"halhalz",
"-"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "updatebal.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-so... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "updatebal.php" SQL injection | https://api.github.com/repos/halhalz/-/issues/1/comments | 0 | 2024-09-30T15:55:02Z | 2024-11-28T07:17:12Z | https://github.com/halhalz/-/issues/1 | 2,557,070,293 | 1 | 6,301 |
CVE-2024-9429 | 2024-10-02T13:15:12.617 | A vulnerability has been found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter2.php. The manipulation of the argument from/to leads to sql injection. The attack can be launched remotely. The exploit has been di... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/23"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/23 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter2.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-sour... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter2.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/23/comments | 0 | 2024-10-02T02:33:58Z | 2025-04-02T15:31:23Z | https://github.com/ppp-src/a/issues/23 | 2,560,555,911 | 23 | 6,302 |
CVE-2024-9440 | 2024-10-02T19:15:15.880 | Slim Select 2.0 versions through 2.9.0 are affected by a potential cross-site scripting vulnerability. In select.ts:createOption(), the text variable from the user-provided Options object is assigned to an innerHTML without sanitation. Software that depends on this library to dynamically generate lists using unsanitize... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Product"
],
"url": "https://github.com/brianvoe/slim-select/blob/e7e37e2ff90e125f846bd98d6b8f278524ead79e/src/slim-select/select.ts#L377"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Exploit",
"Issue Tracking"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slimselectjs:slim_select:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "F806D61F-99D6-4D30-BE39-543D9D2CB93C",
"versionEndExcluding": "2.9.2",
"versionEndIncluding": null,
"vers... | [
"79"
] | 79 | https://github.com/brianvoe/slim-select/issues/564 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"brianvoe",
"slim-select"
] | **Describe the bug**
I have found a Cross Site Scripting in the library, where should I submit the PoC? | Cross Site Scripting | https://api.github.com/repos/brianvoe/slim-select/issues/564/comments | 17 | 2024-09-03T15:56:31Z | 2024-10-16T07:25:51Z | https://github.com/brianvoe/slim-select/issues/564 | 2,503,241,093 | 564 | 6,303 |
CVE-2024-37868 | 2024-10-04T21:15:13.150 | File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the "sendreply.php" file, and the uploaded file was received using the "$- FILES" variable. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/TERRENCE-REX/bfca92171143e28899bb8511f311f9ed"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TERRENCE-REX... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/TERRENCE-REX/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"TERRENCE-REX",
"CVE"
] | # Itsourcecode Online Discussion Forum Project in PHP with Source Code send_reply.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-sourc... | Itsourcecode Online Discussion Forum Project in PHP with Source Code send_reply.php Unrestricted Upload | https://api.github.com/repos/TERRENCE-REX/CVE/issues/1/comments | 0 | 2024-06-09T04:46:31Z | 2024-06-09T06:35:02Z | https://github.com/TERRENCE-REX/CVE/issues/1 | 2,342,020,984 | 1 | 6,304 |
CVE-2024-37869 | 2024-10-04T21:15:13.240 | File Upload vulnerability in Itsourcecode Online Discussion Forum Project v.1.0 allows a remote attacker to execute arbitrary code via the "poster.php" file, and the uploaded file was received using the "$- FILES" variable | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/TERRENCE-REX/7e5dfdd3583bf9fd81196f557a8b8879"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TERRENCE-REX... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/TERRENCE-REX/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"TERRENCE-REX",
"CVE"
] | # Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-co... | Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload | https://api.github.com/repos/TERRENCE-REX/CVE/issues/2/comments | 0 | 2024-06-09T05:22:31Z | 2024-06-09T06:39:36Z | https://github.com/TERRENCE-REX/CVE/issues/2 | 2,342,029,707 | 2 | 6,305 |
CVE-2024-9794 | 2024-10-10T16:15:09.350 | A vulnerability, which was classified as critical, has been found in Codezips Online Shopping Portal 1.0. This issue affects some unknown processing of the file /update-image1.php. The manipulation of the argument productimage1 leads to unrestricted upload. The attack may be initiated remotely. The exploit has been dis... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuld... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "755F393E-3C39-4717-A053-6820CD4965B2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"434"
] | 434 | https://github.com/ppp-src/CVE/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Online Shopping Portal In PHP With Source Code 1.0 update-image1.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Shopping Portal In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/online-shopping-portal-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## sub... | Codezips Online Shopping Portal In PHP With Source Code 1.0 update-image1.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/7/comments | 0 | 2024-10-02T11:11:50Z | 2024-10-03T14:13:14Z | https://github.com/ppp-src/CVE/issues/7 | 2,561,286,633 | 7 | 6,306 |
CVE-2024-9811 | 2024-10-10T21:15:05.383 | A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. This affects an unknown part of the file filter3.php. The manipulation of the argument company leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/24"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/24 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter3.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-sour... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter3.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/24/comments | 0 | 2024-10-06T01:10:31Z | 2025-04-02T15:31:10Z | https://github.com/ppp-src/a/issues/24 | 2,568,403,771 | 24 | 6,307 |
CVE-2024-9812 | 2024-10-10T21:15:05.677 | A vulnerability classified as critical was found in code-projects Crud Operation System 1.0. This vulnerability affects unknown code of the file delete.php. The manipulation of the argument sid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/25"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/25 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Crud Operation System" in PHP 1.0 "delete.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/crud-operation-system-in-php-with-source-code/
# AFFEC... | # code-projects.org"Crud Operation System" in PHP 1.0 "delete.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/25/comments | 0 | 2024-10-06T01:18:24Z | 2025-04-02T15:31:02Z | https://github.com/ppp-src/a/issues/25 | 2,568,405,811 | 25 | 6,308 |
CVE-2024-9813 | 2024-10-10T21:15:05.963 | A vulnerability, which was classified as critical, has been found in Codezips Pharmacy Management System 1.0. This issue affects some unknown processing of the file product/register.php. The manipulation of the argument category leads to sql injection. The attack may be initiated remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/10"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pharmacy_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F881269F-6B88-4C78-866B-B408AA5711F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pharmacy Management System In PHP With Source Code 1.0 product/register.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pharmacy-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S... | Codezips Pharmacy Management System In PHP With Source Code 1.0 product/register.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/10/comments | 0 | 2024-10-06T08:48:17Z | 2024-10-06T08:48:17Z | https://github.com/ppp-src/CVE/issues/10 | 2,568,544,507 | 10 | 6,309 |
CVE-2024-9814 | 2024-10-10T22:15:11.570 | A vulnerability, which was classified as critical, was found in Codezips Pharmacy Management System 1.0. Affected is an unknown function of the file product/update.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/11"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pharmacy_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F881269F-6B88-4C78-866B-B408AA5711F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/11 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pharmacy Management System In PHP With Source Code 1.0 product/update.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pharmacy-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
... | Codezips Pharmacy Management System In PHP With Source Code 1.0 product/update.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/11/comments | 0 | 2024-10-06T08:55:19Z | 2024-10-06T08:55:19Z | https://github.com/ppp-src/CVE/issues/11 | 2,568,547,420 | 11 | 6,310 |
CVE-2024-9815 | 2024-10-10T22:15:11.917 | A vulnerability has been found in Codezips Tourist Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/create-package.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack can be launched remotely. The expl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/12"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:tourist_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1277B81-4CD0-42A8-9DA0-278FC4A653C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"434"
] | 434 | https://github.com/ppp-src/CVE/issues/12 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Tourist Management System In PHP With Source Code 1.0 /admin/create-package.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Tourist Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/tourist-management-system-in-php-with-source-code/#google_vignette
# AFFECTE... | Codezips Tourist Management System In PHP With Source Code 1.0 /admin/create-package.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/12/comments | 0 | 2024-10-06T10:14:36Z | 2024-10-06T10:14:36Z | https://github.com/ppp-src/CVE/issues/12 | 2,568,579,916 | 12 | 6,311 |
CVE-2024-9816 | 2024-10-10T22:15:12.230 | A vulnerability was found in Codezips Tourist Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/change-image.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack may be launched remotely. The exploit has been ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/13"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:tourist_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1277B81-4CD0-42A8-9DA0-278FC4A653C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"434"
] | 434 | https://github.com/ppp-src/CVE/issues/13 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Tourist Management System In PHP With Source Code 1.0 /admin/change-image.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Tourist Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/tourist-management-system-in-php-with-source-code/#google_vignette
# AFFECTED ... | Codezips Tourist Management System In PHP With Source Code 1.0 /admin/change-image.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/13/comments | 0 | 2024-10-06T10:17:30Z | 2024-10-06T10:17:30Z | https://github.com/ppp-src/CVE/issues/13 | 2,568,581,089 | 13 | 6,312 |
CVE-2024-25622 | 2024-10-11T15:15:03.947 | h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. The configuration directives provided by the headers handler allows users to modify the response headers being sent by h2o. The configuration file of h2o has scopes, and the inner scopes (e.g., path level) are expected to inherit the configuration defi... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integri... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/h2o/h2o/commit/123f5e2b65dcdba8f7ef659a00d24bd1249141be"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/h2o/h2o/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC5F2FE2-7FF7-428D-9EC7-0201D0077BA8",
"versionEndExcluding": null,
"versionEndIncluding": "2024-02-11",
"versionStartExcluding... | [
"670"
] | 670 | https://github.com/h2o/h2o/issues/3332 | [
"Issue Tracking"
] | github.com | [
"h2o",
"h2o"
] | I believe I have found a bug in how H2O handles headers, which are configured in h2o.conf: Adding or setting a header at host or path level under one host, removes all headers set at global level for other hosts.
I stumbled on this problem on one of our production servers. This is the simplest h2o.conf to explain th... | Likely bug in handling of header in h2o.conf | https://api.github.com/repos/h2o/h2o/issues/3332/comments | 2 | 2024-01-02T21:07:24Z | 2024-10-11T04:58:13Z | https://github.com/h2o/h2o/issues/3332 | 2,062,956,207 | 3,332 | 6,313 |
CVE-2024-9986 | 2024-10-15T13:15:11.790 | A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file member_register.php. The manipulation of the argument fullname/username/password/email leads to sql injection. The attack may be initiated remotely. The expl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/16"
},
{
"source": "cna@vuld... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # code-projects Blood Bank Management System In PHP With Source Code v1.0 member_register.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Blood Bank Management System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/blood-bank-management-system-in-php-with-source-code/
# AFFECTED AND/OR ... | code-projects Blood Bank Management System In PHP With Source Code v1.0 member_register.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/16/comments | 0 | 2024-10-15T07:05:22Z | 2024-10-15T07:05:22Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/16 | 2,587,845,882 | 16 | 6,314 |
CVE-2024-9486 | 2024-10-15T21:15:11.573 | A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default credentials, and nodes using the resulting images may be accessible via these def... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Patch"
],
"url": "https://github.com/kubernetes-sigs/image-builder/pull/1595"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubernetes/issues/128006"
},
{
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:image_builder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C86E5438-1480-4C06-9A5E-C96F0756E07B",
"versionEndExcluding": "0.1.38",
"versionEndIncluding": null,
"versionSt... | [
"798"
] | 798 | https://github.com/kubernetes/kubernetes/issues/128006 | [
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the image build process. Additionally, virtual machine image... | CVE-2024-9486: VM images built with Image Builder and Proxmox provider use default credentials | https://api.github.com/repos/kubernetes/kubernetes/issues/128006/comments | 0 | 2024-10-11T18:04:31Z | 2024-10-14T15:33:15Z | https://github.com/kubernetes/kubernetes/issues/128006 | 2,581,923,723 | 128,006 | 6,315 |
CVE-2024-9594 | 2024-10-15T21:15:11.790 | A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Patch"
],
"url": "https://github.com/kubernetes-sigs/image-builder/pull/1596"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubernetes/issues/128007"
},
{
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:image_builder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C86E5438-1480-4C06-9A5E-C96F0756E07B",
"versionEndExcluding": "0.1.38",
"versionEndIncluding": null,
"versionSt... | [
"798"
] | 798 | https://github.com/kubernetes/kubernetes/issues/128007 | [
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H)
A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or... | CVE-2024-9594: VM images built with Image Builder with some providers use default credentials during builds | https://api.github.com/repos/kubernetes/kubernetes/issues/128007/comments | 0 | 2024-10-11T18:04:50Z | 2024-10-14T15:33:22Z | https://github.com/kubernetes/kubernetes/issues/128007 | 2,581,924,154 | 128,007 | 6,316 |
CVE-2024-10141 | 2024-10-19T15:15:14.973 | A vulnerability, which was classified as problematic, was found in jsbroks COCO Annotator 0.11.1. This affects an unknown part of the component Session Handler. The manipulation of the argument SECRET_KEY leads to predictable from observable state. It is possible to initiate the attack remotely. The complexity of an at... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jsbroks/coco-annotator/issues/626"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsbroks:coco_annotator:0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "79DC05BD-A99B-4986-B494-7A79B0FBCD94",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"341"
] | 341 | https://github.com/jsbroks/coco-annotator/issues/626 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jsbroks",
"coco-annotator"
] | The coco-annotator project has a default SECRET_KEY, which is used for signing and verifying Flask sessions. If the system administrator does not change the SECRET_KEY when configuring the system, it can lead to arbitrary session forgery by any user and gain administrative privileges.
**Affected versions:**
v0.11.... | Default SECRET_KEY can lead to arbitrary session forgery | https://api.github.com/repos/jsbroks/coco-annotator/issues/626/comments | 1 | 2024-10-12T03:10:44Z | 2024-10-21T01:09:28Z | https://github.com/jsbroks/coco-annotator/issues/626 | 2,582,440,109 | 626 | 6,317 |
CVE-2024-10141 | 2024-10-19T15:15:14.973 | A vulnerability, which was classified as problematic, was found in jsbroks COCO Annotator 0.11.1. This affects an unknown part of the component Session Handler. The manipulation of the argument SECRET_KEY leads to predictable from observable state. It is possible to initiate the attack remotely. The complexity of an at... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jsbroks/coco-annotator/issues/626"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsbroks:coco_annotator:0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "79DC05BD-A99B-4986-B494-7A79B0FBCD94",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"341"
] | 341 | https://github.com/jsbroks/coco-annotator/issues/626#issue-2582440109 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jsbroks",
"coco-annotator"
] | The coco-annotator project has a default SECRET_KEY, which is used for signing and verifying Flask sessions. If the system administrator does not change the SECRET_KEY when configuring the system, it can lead to arbitrary session forgery by any user and gain administrative privileges.
**Affected versions:**
v0.11.... | Default SECRET_KEY can lead to arbitrary session forgery | https://api.github.com/repos/jsbroks/coco-annotator/issues/626/comments | 1 | 2024-10-12T03:10:44Z | 2024-10-21T01:09:28Z | https://github.com/jsbroks/coco-annotator/issues/626 | 2,582,440,109 | 626 | 6,318 |
CVE-2024-10165 | 2024-10-20T03:15:02.557 | A vulnerability was found in Codezips Sales Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file deletecustcom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/14"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 deletecustcom.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submit... | Codezips Sales Management System In PHP With Source Code 1.0 deletecustcom.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/14/comments | 0 | 2024-10-17T13:58:54Z | 2024-10-17T13:58:54Z | https://github.com/ppp-src/CVE/issues/14 | 2,594,837,568 | 14 | 6,319 |
CVE-2024-10166 | 2024-10-20T03:15:02.840 | A vulnerability was found in Codezips Sales Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file checkuser.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the publi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/15"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.280952"
},
{
"source": "cna... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 checkuser.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
... | Codezips Sales Management System In PHP With Source Code 1.0 checkuser.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/15/comments | 0 | 2024-10-17T14:27:36Z | 2024-10-17T14:33:15Z | https://github.com/ppp-src/CVE/issues/15 | 2,594,911,630 | 15 | 6,320 |
CVE-2024-10167 | 2024-10-20T03:15:03.090 | A vulnerability classified as critical has been found in Codezips Sales Management System 1.0. This affects an unknown part of the file deletecustind.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be u... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/16"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.280953"
},
{
"source": "cna... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 deletecustind.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submit... | Codezips Sales Management System In PHP With Source Code 1.0 deletecustind.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/16/comments | 0 | 2024-10-17T14:37:39Z | 2024-10-17T14:37:39Z | https://github.com/ppp-src/CVE/issues/16 | 2,594,940,488 | 16 | 6,321 |
CVE-2024-10169 | 2024-10-20T04:15:02.600 | A vulnerability classified as critical was found in code-projects Hospital Management System 1.0. This vulnerability affects unknown code of the file change-password.php. The manipulation of the argument cpass leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/RainFo666/cve/issues/1"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/RainFo666/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"RainFo666",
"cve"
] | # code-projects Hospital Management System Using PHP With Source Code v1.0 change-password.php SQL injection
# cpass OF AFFECTED PRODUCT(S)
+ Hospital Management System Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/hospital-management-system-using-php-source-code/
# AFFECTED AND/OR FIXE... | code-projects Hospital Management System Using PHP With Source Code v1.0 change-password.php SQL injection | https://api.github.com/repos/RainFo666/cve/issues/1/comments | 0 | 2024-10-17T16:41:26Z | 2024-10-19T06:56:44Z | https://github.com/RainFo666/cve/issues/1 | 2,595,234,197 | 1 | 6,322 |
CVE-2024-10173 | 2024-10-20T05:15:02.830 | A vulnerability has been found in didi DDMQ 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Console Module. The manipulation with the input /;login leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/didi/DDMQ/issues/37"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:didiglobal:ddmq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA66207A-D4D3-4B53-9922-7C3769E241F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"863"
] | 863 | https://github.com/didi/DDMQ/issues/37 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"didi",
"DDMQ"
] | In DDMQ console module through all the versions, a specially crafted request may cause an authentication bypass.Attackers can add “/;login” at the tail of authorization-required urls to bypass the authentication and retrieve sensitive information.
### **Proof of concept**
### **Step1:** we log into the system and b... | A specially crafted request may cause an authentication bypass | https://api.github.com/repos/didi/DDMQ/issues/37/comments | 0 | 2024-10-10T07:27:44Z | 2024-10-10T07:27:44Z | https://github.com/didi/DDMQ/issues/37 | 2,577,905,007 | 37 | 6,323 |
CVE-2024-10173 | 2024-10-20T05:15:02.830 | A vulnerability has been found in didi DDMQ 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Console Module. The manipulation with the input /;login leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/didi/DDMQ/issues/37"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:didiglobal:ddmq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA66207A-D4D3-4B53-9922-7C3769E241F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"863"
] | 863 | https://github.com/didi/DDMQ/issues/37#issue-2577905007 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"didi",
"DDMQ"
] | In DDMQ console module through all the versions, a specially crafted request may cause an authentication bypass.Attackers can add “/;login” at the tail of authorization-required urls to bypass the authentication and retrieve sensitive information.
### **Proof of concept**
### **Step1:** we log into the system and b... | A specially crafted request may cause an authentication bypass | https://api.github.com/repos/didi/DDMQ/issues/37/comments | 0 | 2024-10-10T07:27:44Z | 2024-10-10T07:27:44Z | https://github.com/didi/DDMQ/issues/37 | 2,577,905,007 | 37 | 6,324 |
CVE-2024-9287 | 2024-10-22T17:15:06.697 | A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual e... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/8450b2482586857d689b665... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33E41245-604A-4967-85A8-F3DC04E6D0CC",
"versionEndExcluding": "3.9.21",
"versionEndIncluding": null,
"versionStartExcludin... | [
"77"
] | 77 | https://github.com/python/cpython/issues/124651 | [
"Issue Tracking"
] | github.com | [
"python",
"cpython"
] | # Bug report
### Bug description:
Crafted paths break the script templates:
```console
envname='";uname -a;"'
mkdir "$envname"
cd "$envname"
python3 -m venv .
. ./bin/activate
```
```
Linux archlinux 6.10.6-arch1-1 #1 SMP PREEMPT_DYNAMIC Mon, 19 Aug 2024 17:02:39 +0000 x86_64 GNU/Linux
```
Like p... | [CVE-2024-9287] `venv` activation scripts do not quote strings properly | https://api.github.com/repos/python/cpython/issues/124651/comments | 9 | 2024-09-27T04:00:13Z | 2024-12-13T15:42:25Z | https://github.com/python/cpython/issues/124651 | 2,551,940,669 | 124,651 | 6,325 |
CVE-2024-40493 | 2024-10-22T22:15:04.407 | Null Pointer Dereference in `coap_client_exchange_blockwise2` function in Keith Cullen FreeCoAP 1.0 allows remote attackers to cause a denial of service and potentially execute arbitrary code via a specially crafted CoAP packet that causes `coap_msg_get_payload(resp)` to return a null pointer, which is then dereference... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/dqp10515/fe80005e2fb58ed8ada178ac017e4ad4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/keith-cullen/FreeCoAP/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:keith-cullen:freecoap:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8787D78-015B-4E25-BBCB-B0748567705B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"476"
] | 476 | https://github.com/keith-cullen/FreeCoAP/issues/37 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"keith-cullen",
"FreeCoAP"
] | ## Reproduce Info
### Build Environment Update
The `Makefile` within the `test_coap_server` directory has been updated to utilize `clang` with sanitizers.
```diff
I1 = ../../lib/include
S1 = ../../lib/src
-CC_ ?= gcc
-CFLAGS = -Wall \
+CC_ ?= clang
+CFLAGS = -Wall -g -fsanitize=address,undefined -fno-om... | Bug: Null Pointer Dereference Detected in coap_client.c at coap_client_exchange_blockwise2 Function | https://api.github.com/repos/keith-cullen/FreeCoAP/issues/37/comments | 0 | 2024-05-12T08:00:22Z | 2025-01-22T10:19:11Z | https://github.com/keith-cullen/FreeCoAP/issues/37 | 2,291,215,041 | 37 | 6,326 |
CVE-2024-48423 | 2024-10-24T21:15:14.143 | An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the CallbackToLogRedirector function within the Assimp library. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/assimp/assimp/issues/5788"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD8EC697-A5C6-4066-9E02-9181B33F7428",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"416"
] | 416 | https://github.com/assimp/assimp/issues/5788 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"assimp",
"assimp"
] | ## Affected Projects
assimp v5.4.3 (https://github.com/assimp/assimp)
## Problem Type
CWE-122: Heap-based Buffer Overflow
## Decription
### Summary
A heap-use-after-free (UAF) vulnerability has been identified in the `CallbackToLogRedirector` function within the Assimp library. This issue was discovered... | Bug:Use After Free in the `CallbackToLogRedirector ` | https://api.github.com/repos/assimp/assimp/issues/5788/comments | 1 | 2024-09-20T17:10:59Z | 2024-12-11T10:17:15Z | https://github.com/assimp/assimp/issues/5788 | 2,539,271,300 | 5,788 | 6,327 |
CVE-2024-10350 | 2024-10-24T23:15:13.250 | A vulnerability was found in code-projects Hospital Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/add-doctor.php. The manipulation of the argument docname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/RTio7/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/RTio7/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"RTio7",
"cve"
] | # code-projects Hospital Management System Using PHP With Source Code v1.0 add-doctor.php SQL injection
# docnameOF AFFECTED PRODUCT(S)
+ Hospital Management System Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/hospital-management-system-using-php-source-code/
# AFFECTED AND/OR FIXED VE... | code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection | https://api.github.com/repos/RTio7/cve/issues/1/comments | 0 | 2024-10-21T12:31:55Z | 2024-10-21T12:31:55Z | https://github.com/RTio7/cve/issues/1 | 2,602,408,251 | 1 | 6,328 |
CVE-2024-10368 | 2024-10-25T02:15:02.327 | A vulnerability was found in Codezips Sales Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /addstock.php. The manipulation of the argument prodtype leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/17"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281760"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/17 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 addstock.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
... | Codezips Sales Management System In PHP With Source Code 1.0 addstock.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/17/comments | 0 | 2024-10-23T11:50:26Z | 2024-10-23T11:50:26Z | https://github.com/ppp-src/CVE/issues/17 | 2,608,314,363 | 17 | 6,329 |
CVE-2024-10369 | 2024-10-25T02:15:02.613 | A vulnerability was found in Codezips Sales Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /addcustcom.php. The manipulation of the argument refno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/18"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281761"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/18 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 addcustcom.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | Codezips Sales Management System In PHP With Source Code 1.0 addcustcom.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/18/comments | 0 | 2024-10-23T11:53:23Z | 2024-10-23T11:53:23Z | https://github.com/ppp-src/CVE/issues/18 | 2,608,324,409 | 18 | 6,330 |
CVE-2024-10370 | 2024-10-25T02:15:02.910 | A vulnerability was found in Codezips Sales Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /addcustind.php. The manipulation of the argument refno leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the pu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/19"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281762"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/19 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 addcustind.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | Codezips Sales Management System In PHP With Source Code 1.0 addcustind.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/19/comments | 0 | 2024-10-24T06:20:26Z | 2024-10-24T06:20:26Z | https://github.com/ppp-src/CVE/issues/19 | 2,610,589,397 | 19 | 6,331 |
CVE-2024-10371 | 2024-10-25T02:15:03.280 | A vulnerability classified as critical has been found in SourceCodester Payroll Management System 1.0. This affects the function login of the file main. The manipulation leads to buffer overflow. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/63"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "178D9197-399B-40EA-A85F-4CA99B806F85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"120"
] | 120 | https://github.com/CveSecLook/cve/issues/63 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Payroll Management System in C++ with Source Code v1.0 - Buffer Overflow
Author:shikang
In the main program file, the vulnerability occurs in the login() function, where user input is handled using cin >> UserName;. The input is not properly bounded, allowing an attacker to enter more than the allocated buffer ... | Payroll Management System in C++ with Source Code v1.0 - Buffer Overflow | https://api.github.com/repos/CveSecLook/cve/issues/63/comments | 0 | 2024-10-23T14:36:40Z | 2024-10-23T14:36:40Z | https://github.com/CveSecLook/cve/issues/63 | 2,608,854,552 | 63 | 6,332 |
CVE-2024-48218 | 2024-10-25T21:15:03.603 | Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/list. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/21"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/21 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode Funadmin\addons\curd\app\curd\controller\Table.php list SQL Injection Vulnerability
... | Funadmin v5.0.2 has 1 SQL injection in the/curd/table/list path | https://api.github.com/repos/funadmin/funadmin/issues/21/comments | 1 | 2024-09-15T15:53:38Z | 2025-04-23T05:57:49Z | https://github.com/funadmin/funadmin/issues/21 | 2,526,984,162 | 21 | 6,333 |
CVE-2024-48222 | 2024-10-25T21:15:03.680 | Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/edit. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/22"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/22 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode Funadmin\addons\curd\app\curd\controller\Table.php edit SQL Injection Vulnerability
... | Funadmin v5.0.2 has 1 SQL injection in the/curd/table/edit path | https://api.github.com/repos/funadmin/funadmin/issues/22/comments | 0 | 2024-09-15T16:38:41Z | 2025-04-23T05:57:49Z | https://github.com/funadmin/funadmin/issues/22 | 2,527,016,778 | 22 | 6,334 |
CVE-2024-48223 | 2024-10-25T21:15:03.740 | Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/fieldlist. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/23"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/23 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode Funadmin\addons\curd\app\curd\controller\Table.php fieldlist SQL Injection Vulnerabil... | Funadmin v5.0.2 has 1 SQL injection in the/curd/table/fieldlist path | https://api.github.com/repos/funadmin/funadmin/issues/23/comments | 0 | 2024-09-15T17:00:51Z | 2025-04-23T05:57:50Z | https://github.com/funadmin/funadmin/issues/23 | 2,527,032,932 | 23 | 6,335 |
CVE-2024-48224 | 2024-10-25T21:15:03.793 | Funadmin v5.0.2 has an arbitrary file read vulnerability in /curd/index/editfile. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/24"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"22"
] | 22 | https://github.com/funadmin/funadmin/issues/24 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: Read any file
Vulnerability details:
Curd One Click Command Mode funadmin\app\curd\controller\Index.php editfile Read any file
Install the Curd One C... | Funadmin v5.0.2 has an arbitrary file read in the/curd/index/editfile path | https://api.github.com/repos/funadmin/funadmin/issues/24/comments | 0 | 2024-09-16T06:58:18Z | 2025-04-23T05:57:50Z | https://github.com/funadmin/funadmin/issues/24 | 2,527,654,737 | 24 | 6,336 |
CVE-2024-48226 | 2024-10-25T21:15:03.953 | Funadmin 5.0.2 is vulnerable to SQL Injection in curd/table/savefield. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/26"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/26 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode funadmin\app\curd\controller\Table.php savefield SQL Injection Vulnerability
Install... | There is an SQL injection in the Curd one click command mode plugin | https://api.github.com/repos/funadmin/funadmin/issues/26/comments | 0 | 2024-09-16T15:29:03Z | 2025-04-23T05:57:51Z | https://github.com/funadmin/funadmin/issues/26 | 2,528,790,904 | 26 | 6,337 |
CVE-2024-48229 | 2024-10-25T21:15:04.063 | funadmin 5.0.2 has a SQL injection vulnerability in the Curd one click command mode plugin. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/28"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/28 | [
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode funadmin\app\curd\controller\Index.php add SQL Injection Vulnerability
Install the C... | There is an SQL injection in the Curd one click command mode plugin | https://api.github.com/repos/funadmin/funadmin/issues/28/comments | 0 | 2024-09-17T09:03:24Z | 2025-04-23T05:57:51Z | https://github.com/funadmin/funadmin/issues/28 | 2,530,492,781 | 28 | 6,338 |
CVE-2024-48230 | 2024-10-25T21:15:04.123 | funadmin 5.0.2 is vulnerable to SQL Injection via the parentField parameter in the index method of \backend\controller\auth\Auth.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/30"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/30 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details: The parentField parameter in the index method of funadmin\app\backend\controller\auth\Auth.php has SQL injection
... | auth.Auth#parentField has sql injection vulnerability | https://api.github.com/repos/funadmin/funadmin/issues/30/comments | 0 | 2024-09-17T16:36:23Z | 2025-04-23T05:57:52Z | https://github.com/funadmin/funadmin/issues/30 | 2,531,603,377 | 30 | 6,339 |
CVE-2020-26303 | 2024-10-26T21:15:13.460 | insane is a whitelist-oriented HTML sanitizer. Versions 2.6.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bevacqua/insane/issues/19"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bevacqua:insane:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D2D5027-EF3C-48A6-A6EA-EAACA27F4542",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.2",
"versionStartExcludi... | [
"1333"
] | 1333 | https://github.com/bevacqua/insane/issues/19 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bevacqua",
"insane"
] |
Hello,
The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose an... | Security Issue: Request for contact | https://api.github.com/repos/bevacqua/insane/issues/19/comments | 2 | 2020-11-30T14:20:58Z | 2021-03-01T15:41:31Z | https://github.com/bevacqua/insane/issues/19 | 753,518,672 | 19 | 6,340 |
CVE-2020-26304 | 2024-10-26T21:15:13.673 | Foundation is a front-end framework. Versions 6.3.3 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any fixes are available. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/foundation/foundation-sites/issues/12180"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:foundation:foundation:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64B26903-4DBA-4F36-A148-42FA1B482F1A",
"versionEndExcluding": null,
"versionEndIncluding": "6.3.3",
"versionStartE... | [
"1333"
] | 1333 | https://github.com/foundation/foundation-sites/issues/12180 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"foundation",
"foundation-sites"
] |
Hello,
The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose an... | Security Issue: Request for contact | https://api.github.com/repos/foundation/foundation-sites/issues/12180/comments | 3 | 2020-11-30T14:20:58Z | 2025-02-27T05:57:03Z | https://github.com/foundation/foundation-sites/issues/12180 | 753,518,690 | 12,180 | 6,341 |
CVE-2020-26305 | 2024-10-26T21:15:13.783 | CommonRegexJS is a CommonRegex port for JavaScript. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/talyssonoc/CommonRegexJS/issues/4"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:talyssonoc:commonregexjs:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3DEB6AA1-B907-45A5-BDA9-F78DDE602124",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"1333"
] | 1333 | https://github.com/talyssonoc/CommonRegexJS/issues/4 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"talyssonoc",
"CommonRegexJS"
] |
Hello,
The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose an... | Security Issue: Request for contact | https://api.github.com/repos/talyssonoc/CommonRegexJS/issues/4/comments | 0 | 2020-11-30T14:20:59Z | 2020-11-30T14:20:59Z | https://github.com/talyssonoc/CommonRegexJS/issues/4 | 753,518,703 | 4 | 6,342 |
CVE-2020-26311 | 2024-10-26T21:15:14.400 | Useragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no patches are available. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/3rd-Eden/useragent/issues/167"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:useragent_project:useragent:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "BBA66A46-0609-4D7A-8CB6-B5EAA8E5BB0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"1333"
] | 1333 | https://github.com/3rd-Eden/useragent/issues/167 | [
"Issue Tracking"
] | github.com | [
"3rd-Eden",
"useragent"
] |
Hello,
The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose an... | Security Issue: Request for contact | https://api.github.com/repos/3rd-Eden/useragent/issues/167/comments | 0 | 2020-11-30T14:21:15Z | 2020-11-30T14:21:15Z | https://github.com/3rd-Eden/useragent/issues/167 | 753,518,919 | 167 | 6,343 |
CVE-2024-10412 | 2024-10-27T08:15:02.540 | A vulnerability was found in Poco-z Guns-Medical 1.0. It has been declared as problematic. Affected by this vulnerability is the function upload of the file /mgr/upload of the component File Upload. The manipulation of the argument picture leads to cross site scripting. The attack can be launched remotely. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Poco-z/Guns-Medical/issues/15"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "htt... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:poco-z:guns-medial:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45C434BF-8FFD-44DF-A336-72968B8EE15A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/Poco-z/Guns-Medical/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Poco-z",
"Guns-Medical"
] | **问题描述:**没有对文件类型进行验证,攻击者可以上传恶意文件 直接通过ToolUtil.getFileSuffix(picture.getOriginalFilename()) 保存原有后缀名 可上传恶意的html文件在访问时候触发xss
**修复建议:** 校验文件上传的后缀 renderPicture 位置返回base64编码格式 如: const base64Image = "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAA...";
url: /mgr/upload
参数:file: picture

+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
##... | Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsadd.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/21/comments | 0 | 2024-10-26T12:45:31Z | 2024-10-26T12:45:32Z | https://github.com/ppp-src/CVE/issues/21 | 2,615,843,640 | 21 | 6,345 |
CVE-2024-10427 | 2024-10-27T20:15:02.743 | A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /deleteanimal.php. The manipulation of the argument t1 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/ppp-src/CVE/issues/22"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281968"
},
{
"source": "cna@vuldb.com"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/22 | [
"Exploit"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 deleteanimal.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
... | Codezips Pet Shop Management System In PHP With Source Code V1.0 deleteanimal.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/22/comments | 0 | 2024-10-26T13:02:11Z | 2024-10-26T13:02:11Z | https://github.com/ppp-src/CVE/issues/22 | 2,615,853,861 | 22 | 6,346 |
CVE-2024-50612 | 2024-10-27T22:15:03.613 | libsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote out-of-bounds read. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libsndfile/libsndfile/issues/1035"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsndfile_project:libsndfile:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E71DB9F-FE9E-4369-8473-8D7B860D03DE",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.2",
"versi... | [
"125"
] | 125 | https://github.com/libsndfile/libsndfile/issues/1035 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libsndfile",
"libsndfile"
] | ## Description
The latest version of libsndfile was discovered to contain a memory corruption vulnerability in ogg_vorbis.c:417 vorbis_analysis_wrote() when parsing a specially crafted input file. This vulnerability leads to Denial of Service (DoS).
## ASAN Log
```c
Summary: CRASH detected in vorbis_analysis_wr... | Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote() | https://api.github.com/repos/libsndfile/libsndfile/issues/1035/comments | 4 | 2024-08-29T05:44:12Z | 2024-11-16T18:22:20Z | https://github.com/libsndfile/libsndfile/issues/1035 | 2,493,502,572 | 1,035 | 6,347 |
CVE-2024-50613 | 2024-10-27T22:15:03.660 | libsndfile through 1.2.2 has a reachable assertion, that may lead to application exit, in mpeg_l3_encode.c mpeg_l3_encoder_close. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libsndfile/libsndfile/issues/1034"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsndfile_project:libsndfile:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E71DB9F-FE9E-4369-8473-8D7B860D03DE",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.2",
"versi... | [
"617"
] | 617 | https://github.com/libsndfile/libsndfile/issues/1034 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libsndfile",
"libsndfile"
] | ## Description
The latest version of libsndfile was discovered to contain a reachable assertion vulnerability in mpeg_l3_encode.c:304 mpeg_l3_encoder_close() when parsing a specially crafted input file. This vulnerability can lead to Denial of Service (DoS).
## ASAN Log
```c
Summary: CRASH detected in __pthread_... | Reachable assertion in mpeg_l3_encoder_close | https://api.github.com/repos/libsndfile/libsndfile/issues/1034/comments | 2 | 2024-08-29T05:37:58Z | 2025-01-09T18:31:00Z | https://github.com/libsndfile/libsndfile/issues/1034 | 2,493,495,453 | 1,034 | 6,348 |
CVE-2024-10430 | 2024-10-27T23:15:02.487 | A vulnerability, which was classified as critical, has been found in Codezips Pet Shop Management System 1.0. This issue affects some unknown processing of the file /animalsupdate.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/23"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281981"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/23 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsupdate.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
... | Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsupdate.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/23/comments | 0 | 2024-10-26T14:32:35Z | 2024-10-26T14:32:35Z | https://github.com/ppp-src/CVE/issues/23 | 2,615,904,520 | 23 | 6,349 |
CVE-2024-10431 | 2024-10-27T23:15:02.747 | A vulnerability, which was classified as critical, was found in Codezips Pet Shop Management System 1.0. Affected is an unknown function of the file /deletebird.php. The manipulation of the argument t1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/24"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281982"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/24 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 deletebird.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
##... | Codezips Pet Shop Management System In PHP With Source Code V1.0 deletebird.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/24/comments | 0 | 2024-10-26T14:40:03Z | 2024-10-26T14:40:03Z | https://github.com/ppp-src/CVE/issues/24 | 2,615,907,700 | 24 | 6,350 |
CVE-2024-10449 | 2024-10-28T15:15:04.303 | A vulnerability, which was classified as critical, was found in Codezips Hospital Appointment System 1.0. This affects an unknown part of the file /loginAction.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/25"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282009"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/25 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Hospital Appointment System In PHP With Source Code V1.0 loginAction.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Hospital Appointment System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)... | Codezips Hospital Appointment System In PHP With Source Code V1.0 loginAction.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/25/comments | 0 | 2024-10-27T14:58:29Z | 2024-10-27T14:58:29Z | https://github.com/ppp-src/CVE/issues/25 | 2,616,657,283 | 25 | 6,351 |
CVE-2024-49769 | 2024-10-29T15:15:12.030 | Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removi... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/Pylons/waitress/commit/1ae4e894c9f76543bee06584001583fc6fa8c95c"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/Pyl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:agendaless:waitress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BEED9ACE-30D9-4684-B15C-FABCE120401F",
"versionEndExcluding": "3.0.1",
"versionEndIncluding": null,
"versionStartExc... | [
"772"
] | 772 | https://github.com/Pylons/waitress/issues/418 | [
"Issue Tracking"
] | github.com | [
"Pylons",
"waitress"
] | Following on from debugging in this issue - https://github.com/collective/haufe.requestmonitoring/issues/15
What we see is waitress switching into 100% CPU and staying there. It is happening in production randomly (within a week) and we haven't traced it back to a certain request).
Using a sampling profiler on wa... | 100% cpu in mainthread due to not closing properly? (channel.connected == False) | https://api.github.com/repos/Pylons/waitress/issues/418/comments | 97 | 2023-09-11T10:49:57Z | 2024-11-22T23:18:13Z | https://github.com/Pylons/waitress/issues/418 | 1,890,230,084 | 418 | 6,352 |
CVE-2024-10505 | 2024-10-30T02:15:02.430 | A vulnerability was found in wuzhicms 4.1.0. It has been classified as critical. Affected is the function add/edit of the file www/coreframe/app/content/admin/block.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wuzhicms/wuzhicms/issues/209"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282444"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"94"
] | 94 | https://github.com/wuzhicms/wuzhicms/issues/209 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wuzhicms",
"wuzhicms"
] | Source Code Developer: Beijing Wuzhi Internet Technology Co., Ltd
Source code name:wuzhicms
Source code version:4.1.0
Source code official website:http://www.wuzhicms.com/
Source code download link:https://github.com/wuzhicms/wuzhicms/archive/refs/tags/v4.1.0.zip
Vulnerability description:
The add method in the... | Wuzhims v4.1.0 has a getshell vulnerability | https://api.github.com/repos/wuzhicms/wuzhicms/issues/209/comments | 0 | 2024-10-21T02:26:39Z | 2024-10-21T02:26:39Z | https://github.com/wuzhicms/wuzhicms/issues/209 | 2,601,116,580 | 209 | 6,353 |
CVE-2024-10507 | 2024-10-30T03:15:03.777 | A vulnerability classified as critical was found in Codezips Free Exam Hall Seating Management System 1.0. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/26"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131",
"versionEndExcluding": null,
"versionEndIncluding": null,... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/26 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Free Exam Hall Seating Management System In PHP with Source Code
## Vendor Homepage
+ https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-source-code/
#... | Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 login.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/26/comments | 0 | 2024-10-28T09:57:33Z | 2024-10-28T09:57:33Z | https://github.com/ppp-src/CVE/issues/26 | 2,617,913,597 | 26 | 6,354 |
CVE-2024-10509 | 2024-10-30T03:15:04.060 | A vulnerability, which was classified as critical, has been found in Codezips Online Institute Management System 1.0. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/27"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282449"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/27 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Institute Management System In PHP MYSQL Secure Login Algorithm
## Vendor Homepage
+ https://codezips.com/php/online-institute-management-system-in-php-mysql-secure-l... | Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 login.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/27/comments | 0 | 2024-10-28T10:00:00Z | 2024-10-28T10:00:00Z | https://github.com/ppp-src/CVE/issues/27 | 2,617,919,905 | 27 | 6,355 |
CVE-2024-10556 | 2024-10-31T01:15:14.253 | A vulnerability, which was classified as critical, was found in Codezips Pet Shop Management System 1.0. Affected is an unknown function of the file birdsadd.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/28"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282558"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/28 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## s... | Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsadd.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/28/comments | 0 | 2024-10-28T10:11:02Z | 2024-10-28T10:12:46Z | https://github.com/ppp-src/CVE/issues/28 | 2,617,948,333 | 28 | 6,356 |
CVE-2024-10559 | 2024-10-31T02:15:03.370 | A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical. Affected by this issue is the function details of the component Passport Number Handler. The manipulation leads to buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/64"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282560"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:airport_booking_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13A46EB4-EA63-4C05-A367-CB5D09C034C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"120"
] | 120 | https://github.com/CveSecLook/cve/issues/64 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Airport Booking Management System in C with Source Code v1.0 - Buffer Overflow
Author: YANG HUA
In the main program file, a buffer overflow vulnerability exists on line 73 due to the use of the unsafe function. This function is used to capture input for , but it does not limit the size of input, allowing an att... | Airport Booking Management System in C with Source Code v1.0 - Buffer Overflow | https://api.github.com/repos/CveSecLook/cve/issues/64/comments | 0 | 2024-10-28T23:48:13Z | 2024-10-28T23:48:13Z | https://github.com/CveSecLook/cve/issues/64 | 2,619,798,079 | 64 | 6,357 |
CVE-2024-10561 | 2024-10-31T02:15:03.680 | A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file birdsupdate.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/29"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282561"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/29 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsupdate.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
#... | Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsupdate.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/29/comments | 0 | 2024-10-30T09:25:51Z | 2024-10-30T09:25:51Z | https://github.com/ppp-src/CVE/issues/29 | 2,623,400,797 | 29 | 6,358 |
CVE-2024-10607 | 2024-11-01T01:15:12.153 | A vulnerability was found in code-projects Courier Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /track-result.php. The manipulation of the argument Consignment leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yanhuoshanjin/cve/issues/1"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:carmelogarcia:courier_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A68C07-333F-4BBA-84AE-DB7B0FE774EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/yanhuoshanjin/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yanhuoshanjin",
"cve"
] | # code-projects Courier Management System In PHP With Source Codee v1.0 track-result.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Restaurant Order System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/courier-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION... | code-projects Hospital Management System Using PHP With Source Code v1.0 user-login.php SQL injection | https://api.github.com/repos/yanhuoshanjin/cve/issues/1/comments | 0 | 2024-10-29T13:57:09Z | 2024-10-31T00:35:08Z | https://github.com/yanhuoshanjin/cve/issues/1 | 2,621,351,570 | 1 | 6,359 |
CVE-2024-10608 | 2024-11-01T01:15:12.430 | A vulnerability was found in code-projects Courier Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument txtusername leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AXUyaku/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:carmelogarcia:courier_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A68C07-333F-4BBA-84AE-DB7B0FE774EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/AXUyaku/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"AXUyaku",
"cve"
] | # code-projects Courier Management System In PHP With Source Codee v1.0 login.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Restaurant Order System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/courier-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
##... | code-projects Courier Management System In PHP With Source Codee v1.0 login.php SQL injection | https://api.github.com/repos/AXUyaku/cve/issues/1/comments | 0 | 2024-10-31T02:23:43Z | 2024-10-31T02:23:44Z | https://github.com/AXUyaku/cve/issues/1 | 2,625,829,425 | 1 | 6,360 |
CVE-2024-10609 | 2024-11-01T01:15:12.690 | A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System Project 1.0. This affects an unknown part of the file typeadd.php. The manipulation of the argument sex leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/17"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/17 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 typeadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-wit... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/17/comments | 0 | 2024-10-31T04:48:37Z | 2024-10-31T04:48:37Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/17 | 2,625,963,169 | 17 | 6,361 |
CVE-2024-51377 | 2024-11-01T16:15:09.400 | An issue in Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 allows a remote attacker to execute arbitrary code via the Subject and Identifier fields | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Asadiqbal2/Vulnerabilities-Research/tree/main/CVE-2024-51377"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ladybird... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ladybirdweb:faveo_helpdesk:9.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "67170184-850D-4519-A864-A6552B8D2BA5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"79"
] | 79 | https://github.com/ladybirdweb/faveo-helpdesk/issues/8303 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ladybirdweb",
"faveo-helpdesk"
] | - Faveo Version : 9.2.0
- Product Name : Faveo Helpdesk & Servicedesk (On-Premise and Cloud)
- Reported By : Asad Iqbal
Link: https://github.com/Asadiqbal2
#### Description:
Issue: The stored HTML payload when placed in the subject, identifier ,description of Problem gets executed after the Problem is created
... | Stored HTML Injection in Servicedesk Module | https://api.github.com/repos/faveosuite/faveo-helpdesk/issues/8303/comments | 0 | 2024-10-03T10:08:36Z | 2024-10-17T07:35:23Z | https://github.com/faveosuite/faveo-helpdesk/issues/8303 | 2,563,642,085 | 8,303 | 6,362 |
CVE-2024-10702 | 2024-11-02T18:15:03.363 | A vulnerability classified as critical has been found in code-projects Simple Car Rental System 1.0. Affected is an unknown function of the file /signup.php. The manipulation of the argument fname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/imTedCao/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabinros:simple_car_rental_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2AA148FF-0DFE-4194-B67D-37D10F6CE4F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | [
"89"
] | 89 | https://github.com/imTedCao/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"imTedCao",
"cve"
] | # code-projects Simple Car Rental System In PHP With Source Code v1.0 signup.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Restaurant Order System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/simple-car-rental-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## s... | code-projects Simple Car Rental System In PHP With Source Code v1.0 signup.php SQL injection | https://api.github.com/repos/imTedCao/cve/issues/1/comments | 0 | 2024-11-01T01:28:01Z | 2024-11-01T01:29:20Z | https://github.com/imTedCao/cve/issues/1 | 2,628,116,295 | 1 | 6,363 |
CVE-2024-10733 | 2024-11-03T12:15:12.780 | A vulnerability was found in code-projects Restaurant Order System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument uid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/415Curry/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Re... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:carmelogarcia:restaurant_order_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9426DA-473A-44DC-BD03-A941FF6CFC8F",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/415Curry/cve/issues/1 | [
"Exploit"
] | github.com | [
"415Curry",
"cve"
] | # code-projects Restaurant Order System In PHP With Source Code v1.0 login.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Restaurant Order System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-order-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## subm... | code-projects Restaurant Order System In PHP With Source Code v1.0 login.php SQL injection | https://api.github.com/repos/415Curry/cve/issues/1/comments | 0 | 2024-11-01T01:39:00Z | 2024-11-01T01:39:01Z | https://github.com/415Curry/cve/issues/1 | 2,628,128,246 | 1 | 6,364 |
CVE-2024-10736 | 2024-11-03T15:15:03.113 | A vulnerability was found in Codezips Free Exam Hall Seating Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /student.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/EddieAy/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.282905"
},
{
"source": "cna@vuldb.com",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131",
"versionEndExcluding": null,
"versionEndIncluding": null,... | [
"89"
] | 89 | https://github.com/EddieAy/cve/issues/3 | [
"Exploit"
] | github.com | [
"EddieAy",
"cve"
] | # Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 student.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Free Exam Hall Seating Management System In PHP with Source Code
## Vendor Homepage
+ https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-source-code/
... | Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 student.php SQL injection | https://api.github.com/repos/EddieAy/cve/issues/3/comments | 0 | 2024-11-01T09:26:19Z | 2025-02-09T12:51:21Z | https://github.com/EddieAy/cve/issues/3 | 2,628,678,865 | 3 | 6,365 |
CVE-2024-10737 | 2024-11-03T15:15:03.367 | A vulnerability classified as critical has been found in Codezips Free Exam Hall Seating Management System 1.0. Affected is an unknown function of the file /teacher.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Scholar-XD/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.282906"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131",
"versionEndExcluding": null,
"versionEndIncluding": null,... | [
"89"
] | 89 | https://github.com/Scholar-XD/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Scholar-XD",
"CVE"
] | # Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 teacher.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Free Exam Hall Seating Management System In PHP with Source Code
## Vendor Homepage
+ https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-source-code/
... | Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 teacher.php SQL injection | https://api.github.com/repos/Scholar-XD/CVE/issues/1/comments | 0 | 2024-11-01T12:27:39Z | 2024-11-01T12:27:40Z | https://github.com/Scholar-XD/CVE/issues/1 | 2,628,943,288 | 1 | 6,366 |
CVE-2024-10738 | 2024-11-03T17:15:12.803 | A vulnerability classified as critical was found in itsourcecode Farm Management System 1.0. Affected by this vulnerability is an unknown functionality of the file manage-breed.php. The manipulation of the argument breed leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Nightmaremassacre/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permis... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Nightmaremassacre/cve/issues/3 | [
"Exploit"
] | github.com | [
"Nightmaremassacre",
"cve"
] | # Itsourcecode Farm Management System In PHP v1.0 manage-breed.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Farm Management System In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+... | Itsourcecode Farm Management System In PHP v1.0 manage-breed.php SQL injection | https://api.github.com/repos/Nightmaremassacre/cve/issues/3/comments | 0 | 2024-11-01T14:54:26Z | 2024-11-01T14:54:26Z | https://github.com/Nightmaremassacre/cve/issues/3 | 2,629,206,336 | 3 | 6,367 |
CVE-2024-10751 | 2024-11-04T02:15:14.993 | A vulnerability was found in Codezips ISP Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file pay.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/JiangJiangCC/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.282920"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:isp_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF6890C-7A61-46EA-AF5D-FAB569F6DAD2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/JiangJiangCC/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"JiangJiangCC",
"CVE"
] | # Codezips ISP Management System In PHP With Source Code V1.0 pay.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ ISP Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/isp-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Cuit_jia... | Codezips ISP Management System In PHP With Source Code V1.0 pay.php SQL injection | https://api.github.com/repos/JiangJiangCC/CVE/issues/1/comments | 0 | 2024-11-02T14:09:06Z | 2024-11-02T14:09:06Z | https://github.com/JiangJiangCC/CVE/issues/1 | 2,630,478,284 | 1 | 6,368 |
CVE-2024-10752 | 2024-11-04T02:15:15.310 | A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /productsadd.php. The manipulation of the argument id/name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/primaryboy/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.282921"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/primaryboy/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"primaryboy",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 productupdate.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
... | Codezips Pet Shop Management System In PHP With Source Code V1.0 productupdate.php SQL injection | https://api.github.com/repos/primaryboy/CVE/issues/1/comments | 0 | 2024-11-02T16:44:02Z | 2024-11-02T16:46:12Z | https://github.com/primaryboy/CVE/issues/1 | 2,630,607,486 | 1 | 6,369 |
CVE-2024-10759 | 2024-11-04T04:15:03.273 | A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /edit-pig.php. The manipulation of the argument pigno/weight/arrived/breed/remark/status leads to sql injection. The attack can be initiated remotely. The exploit has... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/liujiaquan1122/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/liujiaquan1122/cve/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"liujiaquan1122",
"cve"
] | # Itsourcecode Farm Management System In PHP v1.0 edit-pig.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Farm Management System In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ liu... | Itsourcecode Farm Management System In PHP v1.0 edit-pig.php SQL injection | https://api.github.com/repos/liujiaquan1122/cve/issues/2/comments | 0 | 2024-11-03T02:26:35Z | 2024-11-03T02:26:35Z | https://github.com/liujiaquan1122/cve/issues/2 | 2,630,917,700 | 2 | 6,370 |
CVE-2024-10764 | 2024-11-04T16:15:04.497 | A vulnerability classified as critical has been found in Codezips Online Institute Management System 1.0. This affects an unknown part of the file /pages/save_user.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/xiaobsss/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.28295... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/xiaobsss/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"xiaobsss",
"CVE"
] | # Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 /pages/save_user.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Institute Management System In PHP MYSQL Secure Login Algorithm
## Vendor Homepage
+ https://codezips.com/php/online-institute-management-system-in-ph... | Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 /pages/save_user.php Unrestricted Upload | https://api.github.com/repos/xiaobsss/CVE/issues/1/comments | 0 | 2024-11-02T19:11:52Z | 2024-11-02T19:11:52Z | https://github.com/xiaobsss/CVE/issues/1 | 2,630,725,456 | 1 | 6,371 |
CVE-2024-10765 | 2024-11-04T16:15:04.890 | A vulnerability classified as critical was found in Codezips Online Institute Management System up to 1.0. This vulnerability affects unknown code of the file /profile.php. The manipulation of the argument old_image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hbuzs/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.282952"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/hbuzs/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hbuzs",
"CVE"
] | # Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 profile.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Institute Management System In PHP MYSQL Secure Login Algorithm
## Vendor Homepage
+ https://codezips.com/php/online-institute-management-system-in-php-mysql-s... | Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 profile.php Unrestricted Upload | https://api.github.com/repos/hbuzs/CVE/issues/1/comments | 0 | 2024-11-03T10:19:30Z | 2024-11-03T10:19:30Z | https://github.com/hbuzs/CVE/issues/1 | 2,631,112,660 | 1 | 6,372 |
CVE-2024-48809 | 2024-11-04T17:15:07.880 | An issue in Open Networking Foundations sdran-in-a-box v.1.4.3 and onos-a1t v.0.2.3 allows a remote attacker to cause a denial of service via the onos-a1t component of the sdran-in-a-box, specifically the DeleteWatcher function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/bergen876/5a21f78e266c12aa2586beb2178443b0"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/onosproject/sdran-in-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:aetherproject:onos-a1t:0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8194B2E5-8575-4F0C-9350-6FA565F35216",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"770"
] | 770 | https://github.com/onosproject/sdran-in-a-box/issues/206 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"onosproject",
"sdran-in-a-box"
] | **Issue Summary –**
Issue: Our tests revealed that the ONOS A1 Termination component of SD RAN ORAN deployment was susceptible to a Denial of Service attack through the continuous replay of concurrent HTTP policies. This attack resulted in the termination of the service, impacting the management of A1 policies.
... | Logic Flaw in Delete Watcher Function | Improper Closure | A1T DoS | https://api.github.com/repos/onosproject/sdran-in-a-box/issues/206/comments | 3 | 2024-10-03T18:16:54Z | 2025-02-25T21:41:54Z | https://github.com/onosproject/sdran-in-a-box/issues/206 | 2,564,699,605 | 206 | 6,373 |
CVE-2024-51136 | 2024-11-04T17:15:08.050 | An XML External Entity (XXE) vulnerability in Dmoz2CSV in openimaj v1.3.10 allows attackers to access sensitive information or execute arbitrary code via supplying a crafted XML file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/openimaj/openimaj"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/openimaj/openimaj/issues/382"
},
{
"source": "cve@mitre.org",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openimaj:openimaj:1.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF734DE-88E3-455D-A60A-FD00CC6CA12B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"611"
] | 611 | https://github.com/openimaj/openimaj/issues/382 | [
"Exploit"
] | github.com | [
"openimaj",
"openimaj"
] | Hi team,
A XXE vulnerability might be exploited when Dmoz2CSV (one of WebTools) is used by users
The xml parser does not enable security settings or disable external entities loading:

When a malicious xml file passed in,... | Potential XXE(XML External Entity Injection) exists in Dmoz2CSV | https://api.github.com/repos/openimaj/openimaj/issues/382/comments | 0 | 2024-10-22T03:03:02Z | 2024-11-04T21:21:57Z | https://github.com/openimaj/openimaj/issues/382 | 2,604,099,096 | 382 | 6,374 |
CVE-2024-10766 | 2024-11-04T18:15:04.330 | A vulnerability, which was classified as critical, has been found in Codezips Free Exam Hall Seating Management System 1.0. This issue affects some unknown processing of the file /pages/save_user.php. The manipulation of the argument image leads to unrestricted upload. The attack may be initiated remotely. The exploit ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Charlotte008/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.2... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131",
"versionEndExcluding": null,
"versionEndIncluding": null,... | [
"434"
] | 434 | https://github.com/Charlotte008/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Charlotte008",
"cve"
] | # Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 update-image1.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Free Exam Hall Seating Management System In PHP with Source Code
## Vendor Homepage
+ https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-so... | Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 /pages/save_user.php Unrestricted Upload | https://api.github.com/repos/Charlotte008/cve/issues/3/comments | 0 | 2024-11-03T07:51:11Z | 2024-11-03T07:58:03Z | https://github.com/Charlotte008/cve/issues/3 | 2,631,043,060 | 3 | 6,375 |
CVE-2024-10791 | 2024-11-04T20:15:04.580 | A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /doctorAction.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/3127434/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.282989"
},
{
"source": "cna@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/3127434/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"3127434",
"CVE"
] | # Codezips Hospital Appointment System In PHP With Source Code V1.0 docterAction.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Hospital Appointment System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S... | Codezips Hospital Appointment System In PHP With Source Code V1.0 docterAction.php SQL injection | https://api.github.com/repos/3127434/CVE/issues/2/comments | 0 | 2024-11-03T13:50:19Z | 2024-11-03T13:50:19Z | https://github.com/3127434/CVE/issues/2 | 2,631,221,155 | 2 | 6,376 |
CVE-2024-10844 | 2024-11-05T15:15:22.337 | A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file search.php. The manipulation of the argument s leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sbm-98/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.283089"
},
{
"source": "cna@v... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10",
"versionEndExcluding": null,
"versionEndInc... | [
"89"
] | 89 | https://github.com/sbm-98/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sbm-98",
"CVE"
] | # 100projects Bookstore Management System PHP MySQL Project V1.0 search.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bookstore Management System PHP MySQL Project
## Vendor Homepage
+ https://1000projects.org/bookstore-management-system-php-mysql-project.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
... | 100projects Bookstore Management System PHP MySQL Project V1.0 search.php SQL injection | https://api.github.com/repos/sbm-98/CVE/issues/1/comments | 0 | 2024-11-04T14:21:06Z | 2024-11-04T14:21:06Z | https://github.com/sbm-98/CVE/issues/1 | 2,632,953,511 | 1 | 6,377 |
CVE-2024-10845 | 2024-11-05T15:15:22.620 | A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file book_detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hbuzs/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.283090"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10",
"versionEndExcluding": null,
"versionEndInc... | [
"89"
] | 89 | https://github.com/hbuzs/CVE/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hbuzs",
"CVE"
] | # 100projects Bookstore Management System PHP MySQL Project V1.0 book_detail.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bookstore Management System PHP MySQL Project
## Vendor Homepage
+ https://1000projects.org/bookstore-management-system-php-mysql-project.html
# AFFECTED AND/OR FIXED VERSION(S)
## submit... | 100projects Bookstore Management System PHP MySQL Project V1.0 book_detail.php SQL injection | https://api.github.com/repos/hbuzs/CVE/issues/3/comments | 0 | 2024-11-04T14:34:50Z | 2024-11-04T14:49:02Z | https://github.com/hbuzs/CVE/issues/3 | 2,632,986,390 | 3 | 6,378 |
CVE-2024-10919 | 2024-11-06T16:15:05.610 | A vulnerability has been found in didi Super-Jacoco 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /cov/triggerUnitCover. The manipulation of the argument uuid leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/didi/super-jacoco/issues/49"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:didi:super-jacoco:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0FE5CE81-6250-439C-B811-B6068786FAD6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"78"
] | 78 | https://github.com/didi/super-jacoco/issues/49 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"didi",
"super-jacoco"
] | When accessing the triggerUnitCover Interface with special request, unauthorized attackers can execute any command on the target system. Attacker can inject command in the parameter uuid.
### Proof of concept:
**The request with file creation and results are as following.**
After sending the payload, wait for a p... | Unauthorized attackers can execute any command with triggerUnitCover Interface | https://api.github.com/repos/didi/super-jacoco/issues/49/comments | 0 | 2024-10-28T06:42:55Z | 2024-10-28T06:42:55Z | https://github.com/didi/super-jacoco/issues/49 | 2,617,470,201 | 49 | 6,379 |
CVE-2024-10920 | 2024-11-06T16:15:05.930 | A vulnerability was found in mariazevedo88 travels-java-api up to 5.0.1 and classified as problematic. Affected by this issue is the function doFilterInternal of the file travels-java-api-master\src\main\java\io\github\mariazevedo88\travelsjavaapi\filters\JwtAuthenticationTokenFilter.java of the component JWT Secret Ha... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mariazevedo88/travels-java-api/issues/23"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.283316"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mariazevedo88:travels-java-api:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA8D4957-2DFF-4D2D-9BE0-1D7EE3E5C60F",
"versionEndExcluding": null,
"versionEndIncluding": "5.0.1",
"vers... | [
"798"
] | 798 | https://github.com/mariazevedo88/travels-java-api/issues/23 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mariazevedo88",
"travels-java-api"
] | **Description:** Hardcoding the JWT secret key can lead to arbitrary users spoofing tokens. Since the travels-java-api is an open-source project, others can easily obtain the JWT secret key of travels-java-api. This allows them to use the JWT secret key to generate arbitrary JWT tokens and gain access to any user's per... | Hardcoding the JWT secret key can lead to arbitrary users spoofing tokens. | https://api.github.com/repos/mariazevedo88/travels-java-api/issues/23/comments | 0 | 2024-10-29T07:35:29Z | 2024-10-29T07:35:29Z | https://github.com/mariazevedo88/travels-java-api/issues/23 | 2,620,405,553 | 23 | 6,380 |
CVE-2024-10964 | 2024-11-07T17:15:06.500 | A vulnerability classified as critical has been found in emqx neuron up to 2.10.0. Affected is the function handle_add_plugin in the library cmd.library of the file plugins/restful/plugin_handle.c. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. It is recommended to apply a patc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/emqx/neuron/issues/2280"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/emqx/neuron/pull/2286"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:neuron:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F83EB1-2071-47DC-9382-73C637394004",
"versionEndExcluding": null,
"versionEndIncluding": "2.10.0",
"versionStartExcluding"... | [
"120"
] | 120 | https://github.com/emqx/neuron/issues/2280 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"emqx",
"neuron"
] | **Buffer Overflow in strcpy(1) handle_add_plugin**
File: plugins/restful/plugin_handle.c
The /api/v2/plugin interface library parameter uses the strcpy function to copy the contents of req->library to cmd.library. This operation poses a risk of buffer overflow since the strcpy function does not check the size of th... | Buffer Overflow in strcpy(1) handle_add_plugin | https://api.github.com/repos/emqx/neuron/issues/2280/comments | 0 | 2024-11-01T06:07:27Z | 2024-11-05T01:51:29Z | https://github.com/emqx/neuron/issues/2280 | 2,628,400,071 | 2,280 | 6,381 |
CVE-2024-10968 | 2024-11-07T20:15:15.633 | A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /contact_process.php. The manipulation of the argument fnm leads to sql injection. The attack can be launched remotely. The exploit has bee... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NG0324/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.283417"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/NG0324/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NG0324",
"CVE"
] | # 100projects Bookstore Management System PHP MySQL Project V1.0 contact_process.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bookstore Management System PHP MySQL Project
## Vendor Homepage
+ https://1000projects.org/bookstore-management-system-php-mysql-project.html
# AFFECTED AND/OR FIXED VERSION(S)
## su... | 100projects Bookstore Management System PHP MySQL Project V1.0 contact_process.php SQL injection | https://api.github.com/repos/NG0324/CVE/issues/1/comments | 0 | 2024-11-05T04:51:22Z | 2024-11-05T04:51:23Z | https://github.com/NG0324/CVE/issues/1 | 2,634,411,874 | 1 | 6,383 |
CVE-2024-10969 | 2024-11-07T20:15:15.930 | A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login_process.php of the component Login. The manipulation of the argument unm leads to sql injection. The attack may be launched remotely. T... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/31"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.283418"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/31 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # 100projects Bookstore Management System PHP MySQL Project V1.0 admin/login_process.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bookstore Management System PHP MySQL Project
## Vendor Homepage
+ https://1000projects.org/bookstore-management-system-php-mysql-project.html
# AFFECTED AND/OR FIXED VERSION(S)
#... | 100projects Bookstore Management System PHP MySQL Project V1.0 admin/login_process.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/31/comments | 0 | 2024-11-05T09:18:12Z | 2024-11-05T09:18:12Z | https://github.com/ppp-src/CVE/issues/31 | 2,634,881,140 | 31 | 6,384 |
CVE-2024-10991 | 2024-11-08T05:15:06.127 | A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /editBranchResult.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/30"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/30 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Hospital Appointment System In PHP With Source Code V1.0 editBranchResult.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Hospital Appointment System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSI... | Codezips Hospital Appointment System In PHP With Source Code V1.0 editBranchResult.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/30/comments | 0 | 2024-11-05T08:32:12Z | 2024-11-05T08:32:12Z | https://github.com/ppp-src/CVE/issues/30 | 2,634,772,456 | 30 | 6,385 |
CVE-2024-10993 | 2024-11-08T06:15:14.243 | A vulnerability, which was classified as critical, was found in Codezips Online Institute Management System 1.0. Affected is an unknown function of the file /manage_website.php. The manipulation of the argument website_image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has bee... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/NG0324/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/NG0324/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"NG0324",
"CVE"
] | # Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 manage_website.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Institute Management System In PHP MYSQL Secure Login Algorithm
## Vendor Homepage
+ https://codezips.com/php/online-institute-management-system-in-php-... | Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 manage_website.php Unrestricted | https://api.github.com/repos/NG0324/CVE/issues/2/comments | 0 | 2024-11-05T08:46:53Z | 2024-11-05T08:46:53Z | https://github.com/NG0324/CVE/issues/2 | 2,634,809,001 | 2 | 6,386 |
CVE-2024-10994 | 2024-11-08T06:15:14.540 | A vulnerability has been found in Codezips Online Institute Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /edit_user.php. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/Hacker0xone/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 edit_user.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Institute Management System In PHP MYSQL Secure Login Algorithm
## Vendor Homepage
+ https://codezips.com/php/online-institute-management-system-in-php-mysql... | Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 edit_user.php Unrestricted Upload | https://api.github.com/repos/Hacker0xOne/CVE/issues/1/comments | 0 | 2024-11-06T15:07:22Z | 2024-11-06T15:07:22Z | https://github.com/Hacker0xOne/CVE/issues/1 | 2,638,367,527 | 1 | 6,387 |
CVE-2024-10995 | 2024-11-08T07:15:07.263 | A vulnerability was found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /removeDoctorResult.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # Codezips Hospital Appointment System In PHP With Source Code V1.0 removeDoctorResult.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Hospital Appointment System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VER... | Codezips Hospital Appointment System In PHP With Source Code V1.0 removeDoctorResult.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/2/comments | 0 | 2024-11-06T15:40:03Z | 2024-11-06T15:40:03Z | https://github.com/Hacker0xOne/CVE/issues/2 | 2,638,469,394 | 2 | 6,388 |
CVE-2024-10996 | 2024-11-08T07:15:08.117 | A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/process_category_edit.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been dis... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/32"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10",
"versionEndExcluding": null,
"versionEndInc... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/32 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # 100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_edit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bookstore Management System PHP MySQL Project
## Vendor Homepage
+ https://1000projects.org/bookstore-management-system-php-mysql-project.html
# AFFECTED AND/OR FIXED VERSI... | 100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_edit.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/32/comments | 0 | 2024-11-06T03:15:37Z | 2024-11-06T03:15:37Z | https://github.com/ppp-src/CVE/issues/32 | 2,636,925,748 | 32 | 6,389 |
CVE-2024-10998 | 2024-11-08T08:15:12.913 | A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/process_category_add.php. The manipulation of the argument cat leads to sql injection. The attack may be initiated remotely. The exploit has been discl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/090913/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10",
"versionEndExcluding": null,
"versionEndInc... | [
"89"
] | 89 | https://github.com/090913/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"090913",
"CVE"
] | # 100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_add.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bookstore Management System PHP MySQL Project
## Vendor Homepage
+ https://1000projects.org/bookstore-management-system-php-mysql-project.html
# AFFECTED AND/OR FIXED VERSIO... | 100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_add.php SQL injection | https://api.github.com/repos/090913/CVE/issues/1/comments | 0 | 2024-11-06T14:52:11Z | 2024-11-06T14:52:11Z | https://github.com/090913/CVE/issues/1 | 2,638,319,792 | 1 | 6,390 |
CVE-2024-25431 | 2024-11-08T17:15:06.023 | An issue in bytecodealliance wasm-micro-runtime before v.b3f728c and fixed in commit 06df58f allows a remote attacker to escalate privileges via a crafted file to the check_was_abi_compatibility function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/haruki3hhh/bd228e6dcaf8c18140e1074964912b39"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/bytecodealliance/wasm-micro-r... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bytecodealliance:webassembly_micro_runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5C4A095-7C30-4027-B83A-DC6C72967FD2",
"versionEndExcluding": "1.3.2",
"versionEndIncluding": null,
... | [
"125"
] | 125 | https://github.com/bytecodealliance/wasm-micro-runtime/issues/3122 | [
"Exploit",
"Patch"
] | github.com | [
"bytecodealliance",
"wasm-micro-runtime"
] | ## Version
commit b3f728ceb36f9c72047a934436ef41699643ab99 (HEAD -> main, origin/main, origin/HEAD)
Author: Wenyong Huang <wenyong.huang@intel.com>
Date: Thu Feb 1 12:42:12 2024 +0800
## Compile
```sh
cd wasm-micro-runtime/product-mini/platforms/linux/
cmake -DCMAKE_C_COMPILER="gcc" -DCMAKE_C_FLAGS="-g -fsan... | Invalid Read Memory in check_wasi_abi_compatibility | https://api.github.com/repos/bytecodealliance/wasm-micro-runtime/issues/3122/comments | 2 | 2024-02-03T03:14:15Z | 2024-03-15T05:48:21Z | https://github.com/bytecodealliance/wasm-micro-runtime/issues/3122 | 2,116,146,074 | 3,122 | 6,391 |
CVE-2024-11055 | 2024-11-10T15:15:13.970 | A vulnerability, which was classified as critical, has been found in 1000 Projects Beauty Parlour Management System 1.0. This issue affects some unknown processing of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection. The attack may be initiated remotely. The exploit h... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/admin-profile.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR ... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/admin-profile.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/3/comments | 0 | 2024-11-08T01:35:06Z | 2024-11-08T01:35:06Z | https://github.com/Hacker0xOne/CVE/issues/3 | 2,642,596,551 | 3 | 6,392 |
CVE-2024-11057 | 2024-11-10T18:15:16.517 | A vulnerability has been found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /removeBranchResult.php. The manipulation of the argument ID/Name leads to sql injection. The attack can be launched remotely. The exploit has bee... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.283801"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/4 | [
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # Codezips Hospital Appointment System In PHP With Source Code V1.0 removeBranchResult.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Hospital Appointment System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VER... | Codezips Hospital Appointment System In PHP With Source Code V1.0 removeBranchResult.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/4/comments | 0 | 2024-11-08T04:18:51Z | 2024-11-08T04:18:52Z | https://github.com/Hacker0xOne/CVE/issues/4 | 2,642,795,118 | 4 | 6,393 |
CVE-2024-46613 | 2024-11-10T21:15:14.790 | WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at core/core-string.c when there are more than two billion items in a list. This affects string_free_split_shared , string_free_split, string_free_split_command, and string_free_split_tags. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weechat/weechat/issues/2178"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://weechat.org/doc/weechat/security/WSA-2024-1/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:weechat:weechat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1A31BC-F7D9-41D0-A7FB-1EE3A5F33C0A",
"versionEndExcluding": "4.4.2",
"versionEndIncluding": null,
"versionStartExcludi... | [
"190"
] | 190 | https://github.com/weechat/weechat/issues/2178 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weechat",
"weechat"
] | ### Question
Hi,
we have detected that your project may be vulnerable to Integer Overflow to Buffer Overflow in the function of `string_free_split_shared `, `string_free_split`, `string_free_split_command` and `string_free_split_tags` in the file of `src/core/core-string.c` . It shares similarities to a recent CV... | Integer Overflow to Buffer Overflow vulnerability in "string_free_split" functions | https://api.github.com/repos/weechat/weechat/issues/2178/comments | 15 | 2024-09-03T08:50:53Z | 2024-12-24T13:06:18Z | https://github.com/weechat/weechat/issues/2178 | 2,502,293,887 | 2,178 | 6,394 |
CVE-2024-11074 | 2024-11-11T18:15:14.620 | A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file /incadd.php. The manipulation of the argument inccat/desc/date/amount leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/dimongshi/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/dimongshi/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"dimongshi",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 incadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 incadd.php SQL injection | https://api.github.com/repos/dimongshi/cve/issues/1/comments | 0 | 2024-11-11T02:14:06Z | 2024-11-11T02:14:06Z | https://github.com/dimongshi/cve/issues/1 | 2,647,926,424 | 1 | 6,395 |
CVE-2024-11097 | 2024-11-12T02:15:17.817 | A vulnerability has been found in SourceCodester Student Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the component Main Menu. The manipulation leads to infinite loop. Attacking locally is a requirement. The exploit has been disclosed to the public and may be us... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.283918"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"835"
] | 835 | https://github.com/Hacker0xone/CVE/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # **SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Buffer Pollution Vulnerability**
## **Vulnerability Name**
+ **Input Buffer Pollution Vulnerability**
---
## **Vulnerability Description**
In the Student Record Management System program, there is an issue with input b... | SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Buffer Pollution Vulnerability | https://api.github.com/repos/Hacker0xOne/CVE/issues/5/comments | 0 | 2024-11-11T04:53:37Z | 2024-11-11T04:53:37Z | https://github.com/Hacker0xOne/CVE/issues/5 | 2,648,153,926 | 5 | 6,396 |
CVE-2024-11100 | 2024-11-12T04:15:04.823 | A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been di... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/6"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR FIXED VERSION(S... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 index.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/6/comments | 0 | 2024-11-11T06:35:51Z | 2024-11-11T06:35:51Z | https://github.com/Hacker0xOne/CVE/issues/6 | 2,648,315,746 | 6 | 6,397 |
CVE-2024-11101 | 2024-11-12T04:15:05.080 | A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/search-invoices.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/7"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-invoices.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/O... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-invoices.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/7/comments | 0 | 2024-11-11T06:42:21Z | 2024-11-11T06:42:21Z | https://github.com/Hacker0xOne/CVE/issues/7 | 2,648,326,184 | 7 | 6,398 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.