cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 997 | cve_metrics dict | cve_references listlengths 1 68 | cve_configurations listlengths 1 5 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 76
values | url stringlengths 37 79 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 128M 2.84B | issue_number int64 1 128k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-6194 | 2024-06-20T16:15:15.393 | A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file editmeasurement.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/HryspaHodor/CVE/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.2... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:tailoring_management_system_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "22AA317A-3C61-4F74-BB73-80E1247BCA62",
"versionEndExcluding": null,
"versionEndIn... | [
"89"
] | 89 | https://github.com/HryspaHodor/CVE/issues/6 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"HryspaHodor",
"CVE"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 editmeasurement.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 editmeasurement.php SQL injection | https://api.github.com/repos/HryspaHodor/CVE/issues/6/comments | 0 | 2024-06-18T06:06:04Z | 2024-06-18T06:06:05Z | https://github.com/HryspaHodor/CVE/issues/6 | 2,358,990,403 | 6 |
CVE-2024-6218 | 2024-06-21T02:15:13.090 | A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. Affected by this issue is some unknown functionality of the file busprofile.php. The manipulation of the argument busid leads to sql injection. The attack may be launched remotely. The exploit has been discl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/HryspaHodor/CVE/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.26... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adrianmercurio:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01988E3D-47DA-45BA-97FC-E6EDD88177DB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/HryspaHodor/CVE/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"HryspaHodor",
"CVE"
] | # Itsourcecode Vehicle Management System Project in PHP 1.0 busprofile.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System Project in PHP Free Download
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/vehicle-management-system-project-in-php-free-download/
# AFFECTED... | Itsourcecode Vehicle Management System Project in PHP 1.0 busprofile.php SQL injection | https://api.github.com/repos/HryspaHodor/CVE/issues/7/comments | 0 | 2024-06-20T06:07:24Z | 2024-06-20T06:07:24Z | https://github.com/HryspaHodor/CVE/issues/7 | 2,363,597,038 | 7 |
CVE-2024-40393 | 2024-07-16T19:15:12.873 | Online Clinic Management System In PHP With Free Source code v1.0 was discovered to contain a SQL injection vulnerability via the user parameter at login.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:online_clinic_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F83E07A-EC1A-47DB-ACEE-279F60BD4F0A",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/47 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Online Clinic Management System In PHP With Free Source code 1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Clinic Management System In PHP With Free Source code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-clinic-management-system-php-projects-... | SourceCodester Online Clinic Management System In PHP With Free Source code 1.0 login.php SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/47/comments | 0 | 2024-06-28T15:28:44Z | 2024-06-28T16:25:30Z | https://github.com/CveSecLook/cve/issues/47 | 2,380,682,375 | 47 |
CVE-2024-6932 | 2024-07-20T22:15:10.190 | A vulnerability was found in ClassCMS 4.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/?action=home&do=shop:index&keyword=&kind=all. The manipulation of the argument order leads to cross site scripting. The attack can be launched remotely. The explo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/42"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271987"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:classcms_project:classcms:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE32DE9-5B81-449F-A6C5-869FB0C110E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/42 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
ClassCMS version 4.5 has a reflected XSS vulnerability that allows attackers to execute any web script or HTML by injecting a carefully crafted payload into the `order` field.
# Details
http://your-ip/admin/?action=home&do=shop:index&keyword=&kind=all&order=%22%3E%3Cscript%3Ealert(document.cookie)%3C/scrip... | ClassCMS v4.5 has a reflected XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/42/comments | 1 | 2024-05-17T07:32:13Z | 2024-07-24T02:48:21Z | https://github.com/Hebing123/cve/issues/42 | 2,302,024,779 | 42 |
CVE-2024-7342 | 2024-08-01T05:15:10.303 | A vulnerability was found in Baidu UEditor 1.4.3.3. It has been classified as problematic. This affects an unknown part of the file /ueditor/php/controller.php?action=uploadfile&encode=utf-8. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/62"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.273... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:baidu:ueditor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5D0ADE2-CF30-42AB-8F6D-D5FAE3724C5B",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.3.3",
"versionStartExcludi... | [
"434"
] | 434 | https://github.com/Hebing123/cve/issues/62 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A stored cross-site scripting (XSS) vulnerability has been identified in UEditor version 1.4.3.3.
The vulnerability stems from the default configuration of config.json files within the ≤1.4.3.3 versions of UEditor, which permits the uploading of `.swf` files. Furthermore, for versions ≥1.4.2 and ≤1.4.3.3, ... | Stored Cross-Site Scripting (XSS) Vulnerability in UEditor 1.4.3.3 | https://api.github.com/repos/Hebing123/cve/issues/62/comments | 1 | 2024-07-25T08:44:45Z | 2024-08-01T08:21:13Z | https://github.com/Hebing123/cve/issues/62 | 2,429,393,116 | 62 |
CVE-2024-7343 | 2024-08-01T05:15:10.573 | A vulnerability was found in Baidu UEditor 1.4.2. It has been declared as problematic. This vulnerability affects unknown code of the file /ueditor142/php/controller.php?action=catchimage. The manipulation of the argument source[] leads to cross site scripting. The attack can be initiated remotely. The exploit has been... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/63"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.273... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:baidu:ueditor:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4283664F-A0E6-4ADD-B69A-CDD8B0190807",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/63 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A reflected cross-site scripting (XSS) vulnerability has been identified in the UEditor 1.4.2. This vulnerability permits an attacker to inject malicious scripts into web pages viewed by users, potentially compromising user data and session integrity.
# Details
The vulnerability exists in the `/ueditor/php... | Reflected XSS Vulnerability in UEditor 1.4.2 | https://api.github.com/repos/Hebing123/cve/issues/63/comments | 1 | 2024-07-25T11:45:34Z | 2024-08-01T08:21:02Z | https://github.com/Hebing123/cve/issues/63 | 2,429,755,671 | 63 |
CVE-2024-7453 | 2024-08-04T05:16:09.523 | A vulnerability was found in FastAdmin 1.5.0.20240328. It has been declared as problematic. This vulnerability affects unknown code of the file /[admins_url].php/general/attachment/edit/ids/4?dialog=1 of the component Attachment Management Section. The manipulation of the argument row[url]/row[imagewidth]/row[imageheig... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/65"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/6... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fastadmin:fastadmin:1.5.0.20240328:*:*:*:*:*:*:*",
"matchCriteriaId": "C48F655F-EFFC-4DAE-88D9-BEABE6CD3EF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/65 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
> FastAdmin is a lightweight and efficient management background framework based on ThinkPHP. It is widely used for its simplicity and powerful features.
FastAdmin 1.5.0.20240328, a version of the FastAdmin framework, contains a stored cross-site scripting (XSS) vulnerability in the backend's General M... | FastAdmin 1.5.0.20240328 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/65/comments | 1 | 2024-08-01T08:27:51Z | 2024-08-05T07:00:20Z | https://github.com/Hebing123/cve/issues/65 | 2,441,815,665 | 65 |
CVE-2024-7453 | 2024-08-04T05:16:09.523 | A vulnerability was found in FastAdmin 1.5.0.20240328. It has been declared as problematic. This vulnerability affects unknown code of the file /[admins_url].php/general/attachment/edit/ids/4?dialog=1 of the component Attachment Management Section. The manipulation of the argument row[url]/row[imagewidth]/row[imageheig... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/65"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/6... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fastadmin:fastadmin:1.5.0.20240328:*:*:*:*:*:*:*",
"matchCriteriaId": "C48F655F-EFFC-4DAE-88D9-BEABE6CD3EF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/66 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
> FastAdmin is a PHP backend development framework that is open-source under the Apache 2.0 license. It is designed for rapid development of backend systems, featuring a permission management system based on Auth verification, and offers a one-click generation of CRUD (Create, Read, Update, Delete) functiona... | FastAdmin 1.5.0.20240328 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/66/comments | 1 | 2024-08-01T08:43:35Z | 2024-08-05T07:00:31Z | https://github.com/Hebing123/cve/issues/66 | 2,441,849,243 | 66 |
CVE-2024-7505 | 2024-08-06T04:16:47.857 | A vulnerability, which was classified as critical, was found in itsourcecode Bike Delivery System 1.0. Affected is an unknown function of the file contact_us_action.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/56"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rainniar:bike_delivery_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD21579-B575-4D3A-BDEB-B936103B4902",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/56 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Itsourcecode Bike Delivery System Source code Sample 1.0 contact_us_action.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bike Delivery System Source code Sample
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bike-delivery-system-source-code-sample/
# AFFECTED AND/OR FIXED VERSION(S)
... | Itsourcecode Bike Delivery System Source code Sample 1.0 contact_us_action.php SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/56/comments | 0 | 2024-08-05T11:25:18Z | 2024-08-05T11:25:18Z | https://github.com/CveSecLook/cve/issues/56 | 2,448,310,157 | 56 |
CVE-2024-7506 | 2024-08-06T05:15:41.413 | A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /setlogo.php. The manipulation of the argument bgimg leads to unrestricted upload. The attack can be launched remotely. The exploit has been d... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/57"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/57 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code setlogo.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source... | Itsourcecode Tailoring Management System Project In PHP With Source Code setlogo.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/57/comments | 0 | 2024-08-05T15:36:19Z | 2024-08-05T15:36:19Z | https://github.com/CveSecLook/cve/issues/57 | 2,448,862,703 | 57 |
CVE-2024-7794 | 2024-08-14T21:15:17.817 | A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file mybill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ppp-src/ha/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.274562"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adrianmercurio:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01988E3D-47DA-45BA-97FC-E6EDD88177DB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/5 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode Vehicle Management System Project in PHP 1.0 mybill.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System Project in PHP Free Download
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/vehicle-management-system-project-in-php-free-download/
# AFFECTED AND... | Itsourcecode Vehicle Management System Project in PHP 1.0 mybill.php SQL injection | https://api.github.com/repos/ppp-src/ha/issues/5/comments | 0 | 2024-08-13T02:18:38Z | 2024-08-13T02:18:38Z | https://github.com/ppp-src/ha/issues/5 | 2,462,232,866 | 5 |
CVE-2024-42681 | 2024-08-15T17:15:18.303 | Insecure Permissions vulnerability in xxl-job v.2.4.1 allows a remote attacker to execute arbitrary code via the Sub-Task ID component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3516"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C90A77A0-C0DF-4EEB-AB59-EFAEBCFFE60B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"276"
] | 276 | https://github.com/xuxueli/xxl-job/issues/3516 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"xuxueli",
"xxl-job"
] | XXL-JOB Version: 2.4.1
Expected Behavior:
Users should only be able to see and execute tasks on the executors they are assigned to.
Ordinary users should not be able to see or execute tasks on executors they are not assigned to.
Actual Behavior:
In version 2.4.1, even though an ordinary user is not assigned to... | XXL-JOB 2.4.1 Permission Issue: Ordinary Users Can Indirectly Execute Tasks of Unassigned Executors via Sub-Task IDs | https://api.github.com/repos/xuxueli/xxl-job/issues/3516/comments | 1 | 2024-07-23T03:09:28Z | 2024-11-10T11:33:28Z | https://github.com/xuxueli/xxl-job/issues/3516 | 2,424,146,540 | 3,516 |
CVE-2024-7838 | 2024-08-15T20:15:18.457 | A vulnerability was found in itsourcecode Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /addcategory.php. The manipulation of the argument cname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ppp-src/a/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.274742"
},
{
"sou... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6AA4AA-216E-471B-9107-65E50C880042",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ppp-src",
"a"
] | # Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "category.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Food Ordering System Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/
# AFFECTED AND/... | Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "category.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/1/comments | 0 | 2024-08-15T00:21:11Z | 2024-08-15T00:21:11Z | https://github.com/ppp-src/a/issues/1 | 2,467,031,541 | 1 |
CVE-2024-7839 | 2024-08-15T21:15:18.237 | A vulnerability classified as critical has been found in itsourcecode Billing System 1.0. This affects an unknown part of the file addbill.php. The manipulation of the argument owners_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/ppp-src/a/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.274743"
},
{
"source": "cna@vuldb.com",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:billing_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6AB542E-F5A5-4637-8D8D-E45F0ED68384",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/2 | [
"Exploit"
] | github.com | [
"ppp-src",
"a"
] | # Itsourcecode "Billing System" in PHP 1.0 "addbill.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Billing System In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ wudongG
... | Itsourcecode "Billing System" in PHP 1.0 "addbill.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/2/comments | 0 | 2024-08-15T00:36:04Z | 2024-08-15T00:36:04Z | https://github.com/ppp-src/a/issues/2 | 2,467,055,446 | 2 |
CVE-2024-7913 | 2024-08-18T22:15:12.480 | A vulnerability was found in itsourcecode Billing System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /addclient1.php. The manipulation of the argument lname/fname/mi/address/contact/meterReader leads to sql injection. The attack may be initiated remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ppp-src/a/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.275039"
},
{
"sou... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:billing_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6AB542E-F5A5-4637-8D8D-E45F0ED68384",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/4 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ppp-src",
"a"
] | # Itsourcecode "Billing System " in PHP 1.0 "addclient1.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Billing System In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
... | Itsourcecode "Billing System " in PHP 1.0 "addclient1.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/4/comments | 0 | 2024-08-15T15:03:58Z | 2024-08-15T15:03:58Z | https://github.com/ppp-src/a/issues/4 | 2,468,258,395 | 4 |
CVE-2024-7592 | 2024-08-19T19:15:08.180 | There is a LOW severity vulnerability affecting CPython, specifically the
'http.cookies' standard library module.
When parsing cookies that contained backslashes for quoted characters in
the cookie value, the parser would use an algorithm with quadratic
complexity, resulting in excess CPU resources being used while p... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/44e458357fca05ca0ae2658... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109",
"versionEndExcluding": "3.8.20",
"versionEndIncluding": null,
"versionStartExcludin... | [
"1333"
] | 1333 | https://github.com/python/cpython/issues/123067 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"python",
"cpython"
] | # Bug report
### Bug description:
## Description
A potential Denial of Service (DoS) vulnerability, identified as CVE-2024-7592, has been discovered in the `_unquote()` method of the `http.cookies` module in Python's standard library. This vulnerability is particularly concerning as it affects frameworks that utiliz... | CVE-2024-7592: Denial of Service Vulnerability in `http.cookies._unquote()` | https://api.github.com/repos/python/cpython/issues/123067/comments | 6 | 2024-08-16T13:31:26Z | 2024-09-04T15:50:52Z | https://github.com/python/cpython/issues/123067 | 2,470,285,353 | 123,067 |
CVE-2024-7947 | 2024-08-20T02:15:06.337 | A vulnerability classified as critical has been found in SourceCodester Point of Sales and Inventory Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/CveSecLook/cve/issues/60"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB4CAA5E-2FA9-4FCB-A2C2-B4D4E4D73896",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/60 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Point of Sales and Inventory Management System in PHP/PDO with Full Source Code login.php V1.0 SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Point of Sales and Inventory Management System in PHP/PDO with Full Source Code
## Vendor Homepage
+ https://www.sourcecodester.com/php/14724/po... | SourceCodester Point of Sales and Inventory Management System in PHP/PDO with Full Source Code login.php V1.0 SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/60/comments | 0 | 2024-08-18T11:48:27Z | 2024-08-18T11:48:27Z | https://github.com/CveSecLook/cve/issues/60 | 2,471,929,525 | 60 |
CVE-2024-8081 | 2024-08-22T22:15:05.510 | A vulnerability classified as critical was found in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ppp-src/ha/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kevinwong:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "493685F6-0114-46FA-A25F-7B05A7D5ACDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/6 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "Payroll Management System " in PHP 1.0 "login.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Payroll Management System
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ tornseck
#... | # Itsourcecode "Payroll Management System " in PHP 1.0 "login.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/6/comments | 1 | 2024-08-22T07:06:36Z | 2024-08-24T14:22:27Z | https://github.com/ppp-src/ha/issues/6 | 2,480,007,118 | 6 |
CVE-2024-8139 | 2024-08-25T01:15:11.300 | A vulnerability has been found in itsourcecode E-Commerce Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file search_list.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Not Applicable"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:e-commerce_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2AFD8B-420C-4152-AE26-691362CAE64D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "E-Commerce Website" in PHP 1.0 "search_list.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ E-Commerce Website In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/e-commerce-website-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submit... | Itsourcecode "E-Commerce Website" in PHP 1.0 "search_list.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/7/comments | 0 | 2024-08-23T08:56:49Z | 2024-08-23T08:56:49Z | https://github.com/ppp-src/ha/issues/7 | 2,482,662,465 | 7 |
CVE-2024-8167 | 2024-08-26T15:15:09.593 | A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file /forget.php. The manipulation of the argument email/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/1"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43FB0433-4530-4F0A-A88F-B017F5DD72F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Job Portal Using PHP With Source Code v1.0 forget.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Job Portal Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/job-portal-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ t4rrega
## Vulnerable File... | code-projects Job Portal Using PHP With Source Code v1.0 forget.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/1/comments | 0 | 2024-08-25T13:41:13Z | 2024-08-25T13:43:20Z | https://github.com/t4rrega/cve/issues/1 | 2,485,263,489 | 1 |
CVE-2024-8168 | 2024-08-26T15:15:09.857 | A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/2"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:online_bus_reservation_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6370AED9-FA1C-4C5C-94A3-8DC8497337DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Bus Reservation Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/online-bus-reservation-system-using-php-source-code/
# AFFECTED AND/OR FIXED VERS... | code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 login.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/2/comments | 0 | 2024-08-25T13:45:59Z | 2024-08-25T13:45:59Z | https://github.com/t4rrega/cve/issues/2 | 2,485,266,983 | 2 |
CVE-2024-8169 | 2024-08-26T15:15:10.123 | A vulnerability was found in code-projects Online Quiz Site 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file signupuser.php. The manipulation of the argument lid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/5"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Online Quiz Site Using PHP With Source Code v1.0 signupuser.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Quiz Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/online-quiz-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ t4rreg... | code-projects Online Quiz Site Using PHP With Source Code v1.0 signupuser.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/5/comments | 0 | 2024-08-25T13:56:04Z | 2024-08-25T13:56:04Z | https://github.com/t4rrega/cve/issues/5 | 2,485,274,271 | 5 |
CVE-2024-8171 | 2024-08-26T16:15:11.273 | A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file staffcatedit.php. The manipulation of the argument title leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/t4rrega/cve/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags": [... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/6 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"t4rrega",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffcatedit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-ph... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 staffcatedit.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/6/comments | 1 | 2024-08-25T13:59:06Z | 2024-08-28T12:19:53Z | https://github.com/t4rrega/cve/issues/6 | 2,485,276,575 | 6 |
CVE-2024-8218 | 2024-08-27T21:15:08.350 | A vulnerability was found in code-projects Online Quiz Site 1.0 and classified as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument loginid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be use... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/7"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Online Quiz Site Using PHP With Source Code v1.0 index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Quiz Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/online-quiz-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ t4rrega
##... | code-projects Online Quiz Site Using PHP With Source Code v1.0 index.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/7/comments | 0 | 2024-08-26T13:48:47Z | 2024-08-26T15:25:03Z | https://github.com/t4rrega/cve/issues/7 | 2,486,925,466 | 7 |
CVE-2024-8219 | 2024-08-27T22:15:05.340 | A vulnerability was found in code-projects Responsive Hotel Site 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument name/phone/email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/t4rrega/cve/issues/8"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/t4rrega/cve/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"t4rrega",
"cve"
] | # code-projects Responsive Hotel Site Using PHP With Source Code v1.0 index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Responsive Hotel Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/responsive-hotel-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | code-projects Responsive Hotel Site Using PHP With Source Code v1.0 index.php SQL injection | https://api.github.com/repos/t4rrega/cve/issues/8/comments | 0 | 2024-08-26T13:52:14Z | 2024-08-26T15:25:14Z | https://github.com/t4rrega/cve/issues/8 | 2,486,933,355 | 8 |
CVE-2024-41361 | 2024-08-29T20:15:08.953 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\manageFilesFolders.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\manageFilesFolders.... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_3 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2398/comments | 1 | 2024-07-11T17:29:36Z | 2024-07-12T04:51:34Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398 | 2,403,698,934 | 2,398 |
CVE-2024-41364 | 2024-08-29T20:15:09.033 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\trackEdit.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\trackEdit.php
``... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_5 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2400/comments | 1 | 2024-07-11T17:29:42Z | 2024-07-12T04:57:33Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400 | 2,403,699,086 | 2,400 |
CVE-2024-41366 | 2024-08-29T20:15:09.113 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\userScripts.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\userScripts.php
... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_4 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2399/comments | 1 | 2024-07-11T17:29:39Z | 2024-07-12T04:54:46Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399 | 2,403,699,035 | 2,399 |
CVE-2024-41367 | 2024-08-29T20:15:09.193 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\api\playlist\appendFileToPlaylist.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\api\playlist\append... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_2 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2397/comments | 1 | 2024-07-11T17:29:34Z | 2024-07-12T04:47:33Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397 | 2,403,698,874 | 2,397 |
CVE-2024-41368 | 2024-08-29T20:15:09.277 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWlanIpMail.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\inc.setWlanIpMail.p... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_1 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2396/comments | 3 | 2024-07-11T17:29:32Z | 2024-07-13T09:15:46Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396 | 2,403,698,799 | 2,396 |
CVE-2024-41369 | 2024-08-29T20:15:09.350 | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWifi.php | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8F3672-D6B8-4655-908F-417A730F8081",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"94"
] | 94 | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"MiczFlor",
"RPi-Jukebox-RFID"
] | ### Version
v2.7.0
### Branch
released
### OS
ubuntu 22
### Pi model
unknown
### Hardware
_No response_
### What happened?
Hello,
I would like to report for a RCE vulnerability in RPi-Jukebox-RFID-v2.7(**No permissions required**)
# Analysis
The path of the vulnerability: htdocs\inc.setWifi.php
... | 🐛 | RPi-Jukebox-RFID V2.7_RCE_6 | https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/2401/comments | 0 | 2024-07-12T06:08:17Z | 2024-07-12T06:08:32Z | https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401 | 2,404,828,568 | 2,401 |
CVE-2024-6232 | 2024-09-03T13:15:05.363 | There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109",
"versionEndExcluding": "3.8.20",
"versionEndIncluding": null,
"versionStartExcludin... | [
"1333"
] | 1333 | https://github.com/python/cpython/issues/121285 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"python",
"cpython"
] | ### Bug description:
Today the `tarfile` module parsing of header values allows for backtracking when parsing header values. Headers have a well-known format that doesn't require backtracking to parse reliably, the new method of parsing will only require a single pass over a byte stream.
### CPython versions tested o... | Remove backtracking from parsing tarfile members and headers | https://api.github.com/repos/python/cpython/issues/121285/comments | 5 | 2024-07-02T18:31:41Z | 2024-09-18T22:22:37Z | https://github.com/python/cpython/issues/121285 | 2,386,893,180 | 121,285 |
CVE-2024-8567 | 2024-09-08T02:15:10.643 | A vulnerability, which was classified as critical, has been found in itsourcecode Payroll Management System 1.0. This issue affects some unknown processing of the file /ajax.php?action=delete_deductions. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:payroll_management_system_project:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB980ED-C02B-49D9-845F-8953C6709DB1",
"versionEndExcluding": null,
"versionEndIncludi... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/8 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "Payroll Management System " in PHP 1.0 "ajax.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Payroll Management System
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## Vul... | Itsourcecode "Payroll Management System " in PHP 1.0 "ajax.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/8/comments | 0 | 2024-09-07T01:57:19Z | 2024-09-07T01:57:19Z | https://github.com/ppp-src/ha/issues/8 | 2,511,380,300 | 8 |
CVE-2024-8866 | 2024-09-15T02:15:01.900 | A vulnerability was found in AutoCMS 5.4. It has been classified as problematic. This affects an unknown part of the file /admin/robot.php. The manipulation of the argument sidebar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/68"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.277503"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autocms_project:autocms:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "07746BD9-33B7-43BD-A742-EA1878F842D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/68 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
AutoCMS v5.4 is affected by a Cross-Site Scripting (XSS) vulnerability and a PHP Code Injection vulnerability. The XSS vulnerability can be exploited to capture administrator credentials, which can then be used to exploit the PHP Code Injection vulnerability.
# Details
## Cross-Site Scripting (XSS) Vulner... | AutoCMS v5.4 XSS and RCE | https://api.github.com/repos/Hebing123/cve/issues/68/comments | 1 | 2024-08-13T07:37:01Z | 2024-09-14T07:10:17Z | https://github.com/Hebing123/cve/issues/68 | 2,462,624,535 | 68 |
CVE-2024-8868 | 2024-09-15T03:15:02.153 | A vulnerability was found in code-projects Crud Operation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file savedata.php. The manipulation of the argument sname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/7"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] |

# code-projects.org"Crud Operation System" in PHP 1.0 "savedata.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Ho... | # code-projects.org"Crud Operation System" in PHP 1.0 "savedata.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/7/comments | 0 | 2024-09-14T06:50:03Z | 2024-09-14T06:50:03Z | https://github.com/ppp-src/a/issues/7 | 2,526,035,039 | 7 |
CVE-2024-8946 | 2024-09-17T19:15:29.220 | A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/micropython/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"787"
] | 787 | https://github.com/micropython/micropython/issues/13006 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"micropython",
"micropython"
] | # Summary
- **OS**: Ubuntu 22.04
- **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd
- **port**: unix
- **contribution**: Junwha Hong and Wonil Jang @S2-Lab UNIST
- **description**:
- at `mp_vfs_umount` extmod/vfs.c:276, the comparison between unmount string and previous mounts are performed... | heap-buffer-overflow: incorrect length choice on memcpy at vfs unmount | https://api.github.com/repos/micropython/micropython/issues/13006/comments | 2 | 2023-11-17T09:50:10Z | 2024-07-23T02:32:29Z | https://github.com/micropython/micropython/issues/13006 | 1,998,710,063 | 13,006 |
CVE-2024-8946 | 2024-09-17T19:15:29.220 | A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/micropython/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"787"
] | 787 | https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"micropython",
"micropython"
] | # Summary
- **OS**: Ubuntu 22.04
- **version**: micropython@a00c9d56db775ee5fc14c2db60eb07bab8e872dd
- **port**: unix
- **contribution**: Junwha Hong and Wonil Jang @S2-Lab UNIST
- **description**:
- at `mp_vfs_umount` extmod/vfs.c:276, the comparison between unmount string and previous mounts are performed... | heap-buffer-overflow: incorrect length choice on memcpy at vfs unmount | https://api.github.com/repos/micropython/micropython/issues/13006/comments | 2 | 2023-11-17T09:50:10Z | 2024-07-23T02:32:29Z | https://github.com/micropython/micropython/issues/13006 | 1,998,710,063 | 13,006 |
CVE-2024-8947 | 2024-09-17T19:15:29.483 | A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file py/objarray.c. The manipulation leads to use after free. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIA... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/microp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F367A317-2420-445C-B455-21BAFD6E2064",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"416"
] | 416 | https://github.com/micropython/micropython/issues/13283 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"micropython",
"micropython"
] | Hi all, I'm Wonil Jang, from the research group S2Lab in UNIST.
We found a use after free bug from micropython by our custom tool. The detailed information is as follows.
## Environment
- OS: Ubuntu 22.04
- Version: micropython at commit a5bdd39127
- Build: unix ports
- Bug Type: use-after-free
- Bug Location:... | use after free found at micropython/py/objarray.c:509 [micropython@a5bdd39127] | https://api.github.com/repos/micropython/micropython/issues/13283/comments | 4 | 2023-12-27T16:49:55Z | 2024-04-22T02:12:14Z | https://github.com/micropython/micropython/issues/13283 | 2,057,585,750 | 13,283 |
CVE-2024-8947 | 2024-09-17T19:15:29.483 | A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file py/objarray.c. The manipulation leads to use after free. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIA... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/microp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F367A317-2420-445C-B455-21BAFD6E2064",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"416"
] | 416 | https://github.com/micropython/micropython/issues/13283#issuecomment-1918479709 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"micropython",
"micropython"
] | Hi all, I'm Wonil Jang, from the research group S2Lab in UNIST.
We found a use after free bug from micropython by our custom tool. The detailed information is as follows.
## Environment
- OS: Ubuntu 22.04
- Version: micropython at commit a5bdd39127
- Build: unix ports
- Bug Type: use-after-free
- Bug Location:... | use after free found at micropython/py/objarray.c:509 [micropython@a5bdd39127] | https://api.github.com/repos/micropython/micropython/issues/13283/comments | 4 | 2023-12-27T16:49:55Z | 2024-04-22T02:12:14Z | https://github.com/micropython/micropython/issues/13283 | 2,057,585,750 | 13,283 |
CVE-2024-8948 | 2024-09-17T19:15:29.747 | A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/micropython/micropython/commit/908ab1ceca15ee6fd0ef82ca4cba770a3ec41894"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:micropython:micropython:1.23.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC6A30E-745D-4C20-B482-1358929743FA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"787"
] | 787 | https://github.com/micropython/micropython/issues/13041 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"micropython",
"micropython"
] | Thank you for the super fast responses for the previous bugs, we found new bug in the core module.
## Summary
- **OS**: Ubuntu 22.04
- **version**: micropython a00c9d5
- **port**: unix
- **contribution**: Junwha Hong and Wonil Jang @S2-Lab, UNIST
- **description**: Because the length check of int_to_bytes doe... | heap-buffer-overflow: from 0 length int_to_bytes | https://api.github.com/repos/micropython/micropython/issues/13041/comments | 1 | 2023-11-21T16:51:00Z | 2024-06-24T04:37:55Z | https://github.com/micropython/micropython/issues/13041 | 2,004,741,539 | 13,041 |
CVE-2024-9011 | 2024-09-20T01:15:10.550 | A vulnerability, which was classified as critical, was found in code-projects Crud Operation System 1.0. Affected is an unknown function of the file updata.php. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/14"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Crud Operation System" in PHP 1.0 "updata.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/crud-operation-system-in-php-with-source-code/
# AFFEC... | code-projects.org"Crud Operation System" in PHP 1.0 "updata.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/14/comments | 0 | 2024-09-18T09:39:42Z | 2024-09-18T09:39:42Z | https://github.com/ppp-src/a/issues/14 | 2,533,224,679 | 14 |
CVE-2024-9078 | 2024-09-22T04:15:04.203 | A vulnerability has been found in code-projects Student Record System 1.0 and classified as critical. This vulnerability affects unknown code of the file /course.php. The manipulation of the argument coursename leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/15"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Student Record System" in PHP 1.0 "course.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Record System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/student-record-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## V... | # code-projects.org"Student Record System" in PHP 1.0 "course.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/15/comments | 0 | 2024-09-20T07:19:59Z | 2024-09-20T07:19:59Z | https://github.com/ppp-src/a/issues/15 | 2,538,075,549 | 15 |
CVE-2024-9079 | 2024-09-22T05:15:11.710 | A vulnerability was found in code-projects Student Record System 1.0 and classified as critical. This issue affects some unknown processing of the file /marks.php. The manipulation of the argument coursename leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and m... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/16"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Student Record System" in PHP 1.0 "marks.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Record System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/student-record-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## Vu... | # code-projects.org"Student Record System" in PHP 1.0 "marks.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/16/comments | 0 | 2024-09-21T04:08:40Z | 2024-09-21T04:08:40Z | https://github.com/ppp-src/a/issues/16 | 2,539,958,391 | 16 |
CVE-2024-9080 | 2024-09-22T07:15:10.607 | A vulnerability was found in code-projects Student Record System 1.0. It has been classified as critical. Affected is an unknown function of the file /pincode-verification.php. The manipulation of the argument pincode leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/17"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/17 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Student Record System" in PHP 1.0 "pincode-verification.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Record System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/student-record-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | # code-projects.org"Student Record System" in PHP 1.0 "pincode-verification.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/17/comments | 0 | 2024-09-21T04:16:46Z | 2024-09-21T04:16:46Z | https://github.com/ppp-src/a/issues/17 | 2,539,960,931 | 17 |
CVE-2024-9085 | 2024-09-22T08:15:02.393 | A vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/18"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/18 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "index.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-source... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "index.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/18/comments | 0 | 2024-09-21T04:19:00Z | 2024-09-21T04:30:03Z | https://github.com/ppp-src/a/issues/18 | 2,539,961,611 | 18 |
CVE-2024-9086 | 2024-09-22T21:15:10.813 | A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. Affected is an unknown function of the file /filter.php. The manipulation of the argument from/to leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/20"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/20 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-sourc... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/20/comments | 0 | 2024-09-21T04:35:48Z | 2024-09-21T04:35:48Z | https://github.com/ppp-src/a/issues/20 | 2,539,967,099 | 20 |
CVE-2024-9087 | 2024-09-22T22:15:02.177 | A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. This affects an unknown part of the file /edit1.php. The manipulation of the argument sno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/19"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vehicle_management_project:vehicle_management:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2AD25F-FE85-4D6F-9FDD-2439840FE0CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/19 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Vehicle Management" in PHP 1.0 "edit1.php " SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/vehicle-management-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## Vulnerable... | # code-projects.org"Vehicle Management" in PHP 1.0 "edit1.php " SQL injection | https://api.github.com/repos/ppp-src/a/issues/19/comments | 0 | 2024-09-21T04:32:56Z | 2024-09-21T04:32:56Z | https://github.com/ppp-src/a/issues/19 | 2,539,966,191 | 19 |
CVE-2024-9088 | 2024-09-22T22:15:02.447 | A vulnerability has been found in SourceCodester Telecom Billing Management System 1.0 and classified as critical. This vulnerability affects the function login. The manipulation of the argument uname leads to buffer overflow. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/61"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:telecom_billing_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C9BFF928-A473-475F-8BA1-939856BCA7C8",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"120"
] | 120 | https://github.com/CveSecLook/cve/issues/61 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Telecom Billing Management System in C++ with Source Code v1.0 - Buffer Overflow
Supplier:https://www.sourcecodester.com/sites/default/files/download/razormist/telecom-billing-management-system-in-c.zip
In the main program file, there is a variable of type char called uname, which receives data using scanf, res... | Telecom Billing Management System in C++ with Source Code v1.0 - Buffer Overflow | https://api.github.com/repos/CveSecLook/cve/issues/61/comments | 0 | 2024-09-21T04:58:47Z | 2024-09-21T04:58:48Z | https://github.com/CveSecLook/cve/issues/61 | 2,539,974,591 | 61 |
CVE-2024-9091 | 2024-09-23T00:15:11.537 | A vulnerability was found in code-projects Student Record System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument regno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/21"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:student_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E81D3A4D-EB3A-4716-B5AA-71424DC86572",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/21 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Student Record System" in PHP 1.0 "index.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Record System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/student-record-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
## Vu... | # code-projects.org"Student Record System" in PHP 1.0 "index.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/21/comments | 0 | 2024-09-21T11:46:42Z | 2024-09-21T11:46:42Z | https://github.com/ppp-src/a/issues/21 | 2,540,205,258 | 21 |
CVE-2024-9359 | 2024-10-01T02:15:10.657 | A vulnerability was found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /addcompany.php. The manipulation of the argument company leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/22"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/22 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "addcompany.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-s... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "addcompany.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/22/comments | 0 | 2024-09-30T15:13:18Z | 2024-09-30T15:13:18Z | https://github.com/ppp-src/a/issues/22 | 2,556,974,748 | 22 |
CVE-2024-9429 | 2024-10-02T13:15:12.617 | A vulnerability has been found in code-projects Restaurant Reservation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter2.php. The manipulation of the argument from/to leads to sql injection. The attack can be launched remotely. The exploit has been di... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/23"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/23 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter2.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-sour... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter2.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/23/comments | 0 | 2024-10-02T02:33:58Z | 2024-10-02T02:33:58Z | https://github.com/ppp-src/a/issues/23 | 2,560,555,911 | 23 |
CVE-2024-9794 | 2024-10-10T16:15:09.350 | A vulnerability, which was classified as critical, has been found in Codezips Online Shopping Portal 1.0. This issue affects some unknown processing of the file /update-image1.php. The manipulation of the argument productimage1 leads to unrestricted upload. The attack may be initiated remotely. The exploit has been dis... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuld... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:online_shopping_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "755F393E-3C39-4717-A053-6820CD4965B2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"434"
] | 434 | https://github.com/ppp-src/CVE/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Online Shopping Portal In PHP With Source Code 1.0 update-image1.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Shopping Portal In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/online-shopping-portal-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## sub... | Codezips Online Shopping Portal In PHP With Source Code 1.0 update-image1.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/7/comments | 0 | 2024-10-02T11:11:50Z | 2024-10-03T14:13:14Z | https://github.com/ppp-src/CVE/issues/7 | 2,561,286,633 | 7 |
CVE-2024-9811 | 2024-10-10T21:15:05.383 | A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. This affects an unknown part of the file filter3.php. The manipulation of the argument company leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/24"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/24 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter3.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/restaurant-reservation-system-in-php-with-sour... | # code-projects.org"Restaurant Reservation System" in PHP 1.0 "filter3.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/24/comments | 0 | 2024-10-06T01:10:31Z | 2024-10-06T01:10:31Z | https://github.com/ppp-src/a/issues/24 | 2,568,403,771 | 24 |
CVE-2024-9812 | 2024-10-10T21:15:05.677 | A vulnerability classified as critical was found in code-projects Crud Operation System 1.0. This vulnerability affects unknown code of the file delete.php. The manipulation of the argument sid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/a/issues/25"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/25 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"a"
] | # code-projects.org"Crud Operation System" in PHP 1.0 "delete.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ https://code-projects.org/crud-operation-system-in-php-with-source-code/
# AFFEC... | # code-projects.org"Crud Operation System" in PHP 1.0 "delete.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/25/comments | 0 | 2024-10-06T01:18:24Z | 2024-10-06T01:18:24Z | https://github.com/ppp-src/a/issues/25 | 2,568,405,811 | 25 |
CVE-2024-9813 | 2024-10-10T21:15:05.963 | A vulnerability, which was classified as critical, has been found in Codezips Pharmacy Management System 1.0. This issue affects some unknown processing of the file product/register.php. The manipulation of the argument category leads to sql injection. The attack may be initiated remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/10"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pharmacy_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F881269F-6B88-4C78-866B-B408AA5711F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pharmacy Management System In PHP With Source Code 1.0 product/register.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pharmacy-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S... | Codezips Pharmacy Management System In PHP With Source Code 1.0 product/register.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/10/comments | 0 | 2024-10-06T08:48:17Z | 2024-10-06T08:48:17Z | https://github.com/ppp-src/CVE/issues/10 | 2,568,544,507 | 10 |
CVE-2024-9814 | 2024-10-10T22:15:11.570 | A vulnerability, which was classified as critical, was found in Codezips Pharmacy Management System 1.0. Affected is an unknown function of the file product/update.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/11"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pharmacy_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F881269F-6B88-4C78-866B-B408AA5711F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/11 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pharmacy Management System In PHP With Source Code 1.0 product/update.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pharmacy-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
... | Codezips Pharmacy Management System In PHP With Source Code 1.0 product/update.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/11/comments | 0 | 2024-10-06T08:55:19Z | 2024-10-06T08:55:19Z | https://github.com/ppp-src/CVE/issues/11 | 2,568,547,420 | 11 |
CVE-2024-9815 | 2024-10-10T22:15:11.917 | A vulnerability has been found in Codezips Tourist Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/create-package.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack can be launched remotely. The expl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/12"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:tourist_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1277B81-4CD0-42A8-9DA0-278FC4A653C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"434"
] | 434 | https://github.com/ppp-src/CVE/issues/12 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Tourist Management System In PHP With Source Code 1.0 /admin/create-package.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Tourist Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/tourist-management-system-in-php-with-source-code/#google_vignette
# AFFECTE... | Codezips Tourist Management System In PHP With Source Code 1.0 /admin/create-package.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/12/comments | 0 | 2024-10-06T10:14:36Z | 2024-10-06T10:14:36Z | https://github.com/ppp-src/CVE/issues/12 | 2,568,579,916 | 12 |
CVE-2024-9816 | 2024-10-10T22:15:12.230 | A vulnerability was found in Codezips Tourist Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/change-image.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack may be launched remotely. The exploit has been ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/13"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:tourist_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1277B81-4CD0-42A8-9DA0-278FC4A653C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"434"
] | 434 | https://github.com/ppp-src/CVE/issues/13 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Tourist Management System In PHP With Source Code 1.0 /admin/change-image.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Tourist Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/tourist-management-system-in-php-with-source-code/#google_vignette
# AFFECTED ... | Codezips Tourist Management System In PHP With Source Code 1.0 /admin/change-image.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/13/comments | 0 | 2024-10-06T10:17:30Z | 2024-10-06T10:17:30Z | https://github.com/ppp-src/CVE/issues/13 | 2,568,581,089 | 13 |
CVE-2024-9986 | 2024-10-15T13:15:11.790 | A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file member_register.php. The manipulation of the argument fullname/username/password/email leads to sql injection. The attack may be initiated remotely. The expl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/16"
},
{
"source": "cna@vuld... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "074BD804-92B2-445A-9A77-DE019D9E8A13",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # code-projects Blood Bank Management System In PHP With Source Code v1.0 member_register.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Blood Bank Management System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/blood-bank-management-system-in-php-with-source-code/
# AFFECTED AND/OR ... | code-projects Blood Bank Management System In PHP With Source Code v1.0 member_register.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/16/comments | 0 | 2024-10-15T07:05:22Z | 2024-10-15T07:05:22Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/16 | 2,587,845,882 | 16 |
CVE-2024-9486 | 2024-10-15T21:15:11.573 | A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default credentials, and nodes using the resulting images may be accessible via these def... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Patch"
],
"url": "https://github.com/kubernetes-sigs/image-builder/pull/1595"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubernetes/issues/128006"
},
{
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:image_builder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C86E5438-1480-4C06-9A5E-C96F0756E07B",
"versionEndExcluding": "0.1.38",
"versionEndIncluding": null,
"versionSt... | [
"798"
] | 798 | https://github.com/kubernetes/kubernetes/issues/128006 | [
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the image build process. Additionally, virtual machine image... | CVE-2024-9486: VM images built with Image Builder and Proxmox provider use default credentials | https://api.github.com/repos/kubernetes/kubernetes/issues/128006/comments | 0 | 2024-10-11T18:04:31Z | 2024-10-14T15:33:15Z | https://github.com/kubernetes/kubernetes/issues/128006 | 2,581,923,723 | 128,006 |
CVE-2024-9594 | 2024-10-15T21:15:11.790 | A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or raw providers. The credentials can be used to gain root access. The credentials are disabled at the conclusion of the image build ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Patch"
],
"url": "https://github.com/kubernetes-sigs/image-builder/pull/1596"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubernetes/issues/128007"
},
{
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:image_builder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C86E5438-1480-4C06-9A5E-C96F0756E07B",
"versionEndExcluding": "0.1.38",
"versionEndIncluding": null,
"versionSt... | [
"798"
] | 798 | https://github.com/kubernetes/kubernetes/issues/128007 | [
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H)
A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the image build process when using the Nutanix, OVA, QEMU or... | CVE-2024-9594: VM images built with Image Builder with some providers use default credentials during builds | https://api.github.com/repos/kubernetes/kubernetes/issues/128007/comments | 0 | 2024-10-11T18:04:50Z | 2024-10-14T15:33:22Z | https://github.com/kubernetes/kubernetes/issues/128007 | 2,581,924,154 | 128,007 |
CVE-2024-10165 | 2024-10-20T03:15:02.557 | A vulnerability was found in Codezips Sales Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file deletecustcom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/14"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 deletecustcom.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submit... | Codezips Sales Management System In PHP With Source Code 1.0 deletecustcom.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/14/comments | 0 | 2024-10-17T13:58:54Z | 2024-10-17T13:58:54Z | https://github.com/ppp-src/CVE/issues/14 | 2,594,837,568 | 14 |
CVE-2024-10166 | 2024-10-20T03:15:02.840 | A vulnerability was found in Codezips Sales Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file checkuser.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the publi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/15"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.280952"
},
{
"source": "cna... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 checkuser.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
... | Codezips Sales Management System In PHP With Source Code 1.0 checkuser.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/15/comments | 0 | 2024-10-17T14:27:36Z | 2024-10-17T14:33:15Z | https://github.com/ppp-src/CVE/issues/15 | 2,594,911,630 | 15 |
CVE-2024-10167 | 2024-10-20T03:15:03.090 | A vulnerability classified as critical has been found in Codezips Sales Management System 1.0. This affects an unknown part of the file deletecustind.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be u... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/16"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.280953"
},
{
"source": "cna... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 deletecustind.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submit... | Codezips Sales Management System In PHP With Source Code 1.0 deletecustind.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/16/comments | 0 | 2024-10-17T14:37:39Z | 2024-10-17T14:37:39Z | https://github.com/ppp-src/CVE/issues/16 | 2,594,940,488 | 16 |
CVE-2024-9287 | 2024-10-22T17:15:06.697 | A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual e... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/8450b2482586857d689b665... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33E41245-604A-4967-85A8-F3DC04E6D0CC",
"versionEndExcluding": "3.9.21",
"versionEndIncluding": null,
"versionStartExcludin... | [
"77"
] | 77 | https://github.com/python/cpython/issues/124651 | [
"Issue Tracking"
] | github.com | [
"python",
"cpython"
] | # Bug report
### Bug description:
Crafted paths break the script templates:
```console
envname='";uname -a;"'
mkdir "$envname"
cd "$envname"
python3 -m venv .
. ./bin/activate
```
```
Linux archlinux 6.10.6-arch1-1 #1 SMP PREEMPT_DYNAMIC Mon, 19 Aug 2024 17:02:39 +0000 x86_64 GNU/Linux
```
Like p... | [CVE-2024-9287] `venv` activation scripts do not quote strings properly | https://api.github.com/repos/python/cpython/issues/124651/comments | 9 | 2024-09-27T04:00:13Z | 2024-12-13T15:42:25Z | https://github.com/python/cpython/issues/124651 | 2,551,940,669 | 124,651 |
CVE-2024-10368 | 2024-10-25T02:15:02.327 | A vulnerability was found in Codezips Sales Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /addstock.php. The manipulation of the argument prodtype leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/17"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281760"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/17 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 addstock.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
... | Codezips Sales Management System In PHP With Source Code 1.0 addstock.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/17/comments | 0 | 2024-10-23T11:50:26Z | 2024-10-23T11:50:26Z | https://github.com/ppp-src/CVE/issues/17 | 2,608,314,363 | 17 |
CVE-2024-10369 | 2024-10-25T02:15:02.613 | A vulnerability was found in Codezips Sales Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /addcustcom.php. The manipulation of the argument refno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/18"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281761"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/18 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 addcustcom.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | Codezips Sales Management System In PHP With Source Code 1.0 addcustcom.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/18/comments | 0 | 2024-10-23T11:53:23Z | 2024-10-23T11:53:23Z | https://github.com/ppp-src/CVE/issues/18 | 2,608,324,409 | 18 |
CVE-2024-10370 | 2024-10-25T02:15:02.910 | A vulnerability was found in Codezips Sales Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /addcustind.php. The manipulation of the argument refno leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the pu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/19"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281762"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:sales_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0D77D5-CEF2-4260-8D44-5D3C173C98A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/19 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Sales Management System In PHP With Source Code 1.0 addcustind.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Sales Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/sales-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | Codezips Sales Management System In PHP With Source Code 1.0 addcustind.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/19/comments | 0 | 2024-10-24T06:20:26Z | 2024-10-24T06:20:26Z | https://github.com/ppp-src/CVE/issues/19 | 2,610,589,397 | 19 |
CVE-2024-10371 | 2024-10-25T02:15:03.280 | A vulnerability classified as critical has been found in SourceCodester Payroll Management System 1.0. This affects the function login of the file main. The manipulation leads to buffer overflow. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/63"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "178D9197-399B-40EA-A85F-4CA99B806F85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"120"
] | 120 | https://github.com/CveSecLook/cve/issues/63 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Payroll Management System in C++ with Source Code v1.0 - Buffer Overflow
Author:shikang
In the main program file, the vulnerability occurs in the login() function, where user input is handled using cin >> UserName;. The input is not properly bounded, allowing an attacker to enter more than the allocated buffer ... | Payroll Management System in C++ with Source Code v1.0 - Buffer Overflow | https://api.github.com/repos/CveSecLook/cve/issues/63/comments | 0 | 2024-10-23T14:36:40Z | 2024-10-23T14:36:40Z | https://github.com/CveSecLook/cve/issues/63 | 2,608,854,552 | 63 |
CVE-2024-48218 | 2024-10-25T21:15:03.603 | Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/list. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/21"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/21 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode Funadmin\addons\curd\app\curd\controller\Table.php list SQL Injection Vulnerability
... | Funadmin v5.0.2 has 1 SQL injection in the/curd/table/list path | https://api.github.com/repos/funadmin/funadmin/issues/21/comments | 1 | 2024-09-15T15:53:38Z | 2024-09-16T07:36:32Z | https://github.com/funadmin/funadmin/issues/21 | 2,526,984,162 | 21 |
CVE-2024-48222 | 2024-10-25T21:15:03.680 | Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/edit. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/22"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/22 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode Funadmin\addons\curd\app\curd\controller\Table.php edit SQL Injection Vulnerability
... | Funadmin v5.0.2 has 1 SQL injection in the/curd/table/edit path | https://api.github.com/repos/funadmin/funadmin/issues/22/comments | 0 | 2024-09-15T16:38:41Z | 2024-09-16T07:36:49Z | https://github.com/funadmin/funadmin/issues/22 | 2,527,016,778 | 22 |
CVE-2024-48223 | 2024-10-25T21:15:03.740 | Funadmin v5.0.2 has a SQL injection vulnerability in /curd/table/fieldlist. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/23"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/23 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode Funadmin\addons\curd\app\curd\controller\Table.php fieldlist SQL Injection Vulnerabil... | Funadmin v5.0.2 has 1 SQL injection in the/curd/table/fieldlist path | https://api.github.com/repos/funadmin/funadmin/issues/23/comments | 0 | 2024-09-15T17:00:51Z | 2024-09-16T07:37:06Z | https://github.com/funadmin/funadmin/issues/23 | 2,527,032,932 | 23 |
CVE-2024-48224 | 2024-10-25T21:15:03.793 | Funadmin v5.0.2 has an arbitrary file read vulnerability in /curd/index/editfile. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/24"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"22"
] | 22 | https://github.com/funadmin/funadmin/issues/24 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: Read any file
Vulnerability details:
Curd One Click Command Mode funadmin\app\curd\controller\Index.php editfile Read any file
Install the Curd One C... | Funadmin v5.0.2 has an arbitrary file read in the/curd/index/editfile path | https://api.github.com/repos/funadmin/funadmin/issues/24/comments | 0 | 2024-09-16T06:58:18Z | 2024-09-16T07:37:20Z | https://github.com/funadmin/funadmin/issues/24 | 2,527,654,737 | 24 |
CVE-2024-48226 | 2024-10-25T21:15:03.953 | Funadmin 5.0.2 is vulnerable to SQL Injection in curd/table/savefield. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/26"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/26 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode funadmin\app\curd\controller\Table.php savefield SQL Injection Vulnerability
Install... | There is an SQL injection in the Curd one click command mode plugin | https://api.github.com/repos/funadmin/funadmin/issues/26/comments | 0 | 2024-09-16T15:29:03Z | 2024-09-16T15:29:03Z | https://github.com/funadmin/funadmin/issues/26 | 2,528,790,904 | 26 |
CVE-2024-48229 | 2024-10-25T21:15:04.063 | funadmin 5.0.2 has a SQL injection vulnerability in the Curd one click command mode plugin. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/28"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/28 | [
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details:
Curd One Click Command Mode funadmin\app\curd\controller\Index.php add SQL Injection Vulnerability
Install the C... | There is an SQL injection in the Curd one click command mode plugin | https://api.github.com/repos/funadmin/funadmin/issues/28/comments | 0 | 2024-09-17T09:03:24Z | 2024-09-17T09:33:53Z | https://github.com/funadmin/funadmin/issues/28 | 2,530,492,781 | 28 |
CVE-2024-48230 | 2024-10-25T21:15:04.123 | funadmin 5.0.2 is vulnerable to SQL Injection via the parentField parameter in the index method of \backend\controller\auth\Auth.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/30"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C1D3FE-9FFB-4D43-B65E-44962B5EA2EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/30 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability product: funadmin
Vulnerability version: 5.0.2
Source code link: https://github.com/funadmin/funadmin/archive/refs/tags/v5.0.2.zip
Vulnerability type: SQL injection
Vulnerability details: The parentField parameter in the index method of funadmin\app\backend\controller\auth\Auth.php has SQL injection
... | auth.Auth#parentField has sql injection vulnerability | https://api.github.com/repos/funadmin/funadmin/issues/30/comments | 0 | 2024-09-17T16:36:23Z | 2024-09-17T16:36:23Z | https://github.com/funadmin/funadmin/issues/30 | 2,531,603,377 | 30 |
CVE-2024-10426 | 2024-10-27T20:15:02.447 | A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /animalsadd.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/21"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281967"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/21 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
##... | Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsadd.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/21/comments | 0 | 2024-10-26T12:45:31Z | 2024-10-26T12:45:32Z | https://github.com/ppp-src/CVE/issues/21 | 2,615,843,640 | 21 |
CVE-2024-10427 | 2024-10-27T20:15:02.743 | A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /deleteanimal.php. The manipulation of the argument t1 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/ppp-src/CVE/issues/22"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281968"
},
{
"source": "cna@vuldb.com"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/22 | [
"Exploit"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 deleteanimal.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
... | Codezips Pet Shop Management System In PHP With Source Code V1.0 deleteanimal.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/22/comments | 0 | 2024-10-26T13:02:11Z | 2024-10-26T13:02:11Z | https://github.com/ppp-src/CVE/issues/22 | 2,615,853,861 | 22 |
CVE-2024-10430 | 2024-10-27T23:15:02.487 | A vulnerability, which was classified as critical, has been found in Codezips Pet Shop Management System 1.0. This issue affects some unknown processing of the file /animalsupdate.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/23"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281981"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/23 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsupdate.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
... | Codezips Pet Shop Management System In PHP With Source Code V1.0 animalsupdate.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/23/comments | 0 | 2024-10-26T14:32:35Z | 2024-10-26T14:32:35Z | https://github.com/ppp-src/CVE/issues/23 | 2,615,904,520 | 23 |
CVE-2024-10431 | 2024-10-27T23:15:02.747 | A vulnerability, which was classified as critical, was found in Codezips Pet Shop Management System 1.0. Affected is an unknown function of the file /deletebird.php. The manipulation of the argument t1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/24"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.281982"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/24 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 deletebird.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
##... | Codezips Pet Shop Management System In PHP With Source Code V1.0 deletebird.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/24/comments | 0 | 2024-10-26T14:40:03Z | 2024-10-26T14:40:03Z | https://github.com/ppp-src/CVE/issues/24 | 2,615,907,700 | 24 |
CVE-2024-10449 | 2024-10-28T15:15:04.303 | A vulnerability, which was classified as critical, was found in Codezips Hospital Appointment System 1.0. This affects an unknown part of the file /loginAction.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/25"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282009"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/25 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Hospital Appointment System In PHP With Source Code V1.0 loginAction.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Hospital Appointment System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)... | Codezips Hospital Appointment System In PHP With Source Code V1.0 loginAction.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/25/comments | 0 | 2024-10-27T14:58:29Z | 2024-10-27T14:58:29Z | https://github.com/ppp-src/CVE/issues/25 | 2,616,657,283 | 25 |
CVE-2024-10507 | 2024-10-30T03:15:03.777 | A vulnerability classified as critical was found in Codezips Free Exam Hall Seating Management System 1.0. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/26"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131",
"versionEndExcluding": null,
"versionEndIncluding": null,... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/26 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Free Exam Hall Seating Management System In PHP with Source Code
## Vendor Homepage
+ https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-source-code/
#... | Codezips Free Exam Hall Seating Management System In PHP with Source Code V1.0 login.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/26/comments | 0 | 2024-10-28T09:57:33Z | 2024-10-28T09:57:33Z | https://github.com/ppp-src/CVE/issues/26 | 2,617,913,597 | 26 |
CVE-2024-10509 | 2024-10-30T03:15:04.060 | A vulnerability, which was classified as critical, has been found in Codezips Online Institute Management System 1.0. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/27"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282449"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/27 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Institute Management System In PHP MYSQL Secure Login Algorithm
## Vendor Homepage
+ https://codezips.com/php/online-institute-management-system-in-php-mysql-secure-l... | Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 login.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/27/comments | 0 | 2024-10-28T10:00:00Z | 2024-10-28T10:00:00Z | https://github.com/ppp-src/CVE/issues/27 | 2,617,919,905 | 27 |
CVE-2024-10556 | 2024-10-31T01:15:14.253 | A vulnerability, which was classified as critical, was found in Codezips Pet Shop Management System 1.0. Affected is an unknown function of the file birdsadd.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/28"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282558"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/28 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## s... | Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsadd.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/28/comments | 0 | 2024-10-28T10:11:02Z | 2024-10-28T10:12:46Z | https://github.com/ppp-src/CVE/issues/28 | 2,617,948,333 | 28 |
CVE-2024-10559 | 2024-10-31T02:15:03.370 | A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical. Affected by this issue is the function details of the component Passport Number Handler. The manipulation leads to buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/64"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282560"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:airport_booking_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13A46EB4-EA63-4C05-A367-CB5D09C034C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"120"
] | 120 | https://github.com/CveSecLook/cve/issues/64 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Airport Booking Management System in C with Source Code v1.0 - Buffer Overflow
Author: YANG HUA
In the main program file, a buffer overflow vulnerability exists on line 73 due to the use of the unsafe function. This function is used to capture input for , but it does not limit the size of input, allowing an att... | Airport Booking Management System in C with Source Code v1.0 - Buffer Overflow | https://api.github.com/repos/CveSecLook/cve/issues/64/comments | 0 | 2024-10-28T23:48:13Z | 2024-10-28T23:48:13Z | https://github.com/CveSecLook/cve/issues/64 | 2,619,798,079 | 64 |
CVE-2024-10561 | 2024-10-31T02:15:03.680 | A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file birdsupdate.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/29"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.282561"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/29 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsupdate.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pet Shop Management System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/pet-shop-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
#... | Codezips Pet Shop Management System In PHP With Source Code V1.0 birdsupdate.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/29/comments | 0 | 2024-10-30T09:25:51Z | 2024-10-30T09:25:51Z | https://github.com/ppp-src/CVE/issues/29 | 2,623,400,797 | 29 |
CVE-2024-10609 | 2024-11-01T01:15:12.690 | A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System Project 1.0. This affects an unknown part of the file typeadd.php. The manipulation of the argument sex leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/17"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/17 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 typeadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-wit... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/17/comments | 0 | 2024-10-31T04:48:37Z | 2024-10-31T04:48:37Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/17 | 2,625,963,169 | 17 |
CVE-2024-10969 | 2024-11-07T20:15:15.930 | A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login_process.php of the component Login. The manipulation of the argument unm leads to sql injection. The attack may be launched remotely. T... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/31"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.283418"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/31 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # 100projects Bookstore Management System PHP MySQL Project V1.0 admin/login_process.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bookstore Management System PHP MySQL Project
## Vendor Homepage
+ https://1000projects.org/bookstore-management-system-php-mysql-project.html
# AFFECTED AND/OR FIXED VERSION(S)
#... | 100projects Bookstore Management System PHP MySQL Project V1.0 admin/login_process.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/31/comments | 0 | 2024-11-05T09:18:12Z | 2024-11-05T09:18:12Z | https://github.com/ppp-src/CVE/issues/31 | 2,634,881,140 | 31 |
CVE-2024-10991 | 2024-11-08T05:15:06.127 | A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /editBranchResult.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/30"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/30 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # Codezips Hospital Appointment System In PHP With Source Code V1.0 editBranchResult.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Hospital Appointment System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSI... | Codezips Hospital Appointment System In PHP With Source Code V1.0 editBranchResult.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/30/comments | 0 | 2024-11-05T08:32:12Z | 2024-11-05T08:32:12Z | https://github.com/ppp-src/CVE/issues/30 | 2,634,772,456 | 30 |
CVE-2024-10994 | 2024-11-08T06:15:14.540 | A vulnerability has been found in Codezips Online Institute Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /edit_user.php. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:online_institute_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51A6CFF2-B568-4430-ACB8-C640A44A06B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/Hacker0xone/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 edit_user.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Institute Management System In PHP MYSQL Secure Login Algorithm
## Vendor Homepage
+ https://codezips.com/php/online-institute-management-system-in-php-mysql... | Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm 1.0 edit_user.php Unrestricted Upload | https://api.github.com/repos/Hacker0xOne/CVE/issues/1/comments | 0 | 2024-11-06T15:07:22Z | 2024-11-06T15:07:22Z | https://github.com/Hacker0xOne/CVE/issues/1 | 2,638,367,527 | 1 |
CVE-2024-10995 | 2024-11-08T07:15:07.263 | A vulnerability was found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /removeDoctorResult.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # Codezips Hospital Appointment System In PHP With Source Code V1.0 removeDoctorResult.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Hospital Appointment System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VER... | Codezips Hospital Appointment System In PHP With Source Code V1.0 removeDoctorResult.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/2/comments | 0 | 2024-11-06T15:40:03Z | 2024-11-06T15:40:03Z | https://github.com/Hacker0xOne/CVE/issues/2 | 2,638,469,394 | 2 |
CVE-2024-10996 | 2024-11-08T07:15:08.117 | A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/process_category_edit.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been dis... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/32"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10",
"versionEndExcluding": null,
"versionEndInc... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/32 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # 100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_edit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bookstore Management System PHP MySQL Project
## Vendor Homepage
+ https://1000projects.org/bookstore-management-system-php-mysql-project.html
# AFFECTED AND/OR FIXED VERSI... | 100projects Bookstore Management System PHP MySQL Project V1.0 admin/process_category_edit.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/32/comments | 0 | 2024-11-06T03:15:37Z | 2024-11-06T03:15:37Z | https://github.com/ppp-src/CVE/issues/32 | 2,636,925,748 | 32 |
CVE-2024-11055 | 2024-11-10T15:15:13.970 | A vulnerability, which was classified as critical, has been found in 1000 Projects Beauty Parlour Management System 1.0. This issue affects some unknown processing of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection. The attack may be initiated remotely. The exploit h... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/admin-profile.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR ... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/admin-profile.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/3/comments | 0 | 2024-11-08T01:35:06Z | 2024-11-08T01:35:06Z | https://github.com/Hacker0xOne/CVE/issues/3 | 2,642,596,551 | 3 |
CVE-2024-11057 | 2024-11-10T18:15:16.517 | A vulnerability has been found in Codezips Hospital Appointment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /removeBranchResult.php. The manipulation of the argument ID/Name leads to sql injection. The attack can be launched remotely. The exploit has bee... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.283801"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:hospital_appointment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "433A683B-ACF7-4D3C-8078-D70615147B08",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/4 | [
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # Codezips Hospital Appointment System In PHP With Source Code V1.0 removeBranchResult.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Hospital Appointment System In PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/hospital-appointment-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VER... | Codezips Hospital Appointment System In PHP With Source Code V1.0 removeBranchResult.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/4/comments | 0 | 2024-11-08T04:18:51Z | 2024-11-08T04:18:52Z | https://github.com/Hacker0xOne/CVE/issues/4 | 2,642,795,118 | 4 |
CVE-2024-11097 | 2024-11-12T02:15:17.817 | A vulnerability has been found in SourceCodester Student Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the component Main Menu. The manipulation leads to infinite loop. Attacking locally is a requirement. The exploit has been disclosed to the public and may be us... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.283918"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"835"
] | 835 | https://github.com/Hacker0xone/CVE/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # **SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Buffer Pollution Vulnerability**
## **Vulnerability Name**
+ **Input Buffer Pollution Vulnerability**
---
## **Vulnerability Description**
In the Student Record Management System program, there is an issue with input b... | SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Buffer Pollution Vulnerability | https://api.github.com/repos/Hacker0xOne/CVE/issues/5/comments | 0 | 2024-11-11T04:53:37Z | 2024-11-11T04:53:37Z | https://github.com/Hacker0xOne/CVE/issues/5 | 2,648,153,926 | 5 |
CVE-2024-11100 | 2024-11-12T04:15:04.823 | A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been di... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/6"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR FIXED VERSION(S... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 index.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/6/comments | 0 | 2024-11-11T06:35:51Z | 2024-11-11T06:35:51Z | https://github.com/Hacker0xOne/CVE/issues/6 | 2,648,315,746 | 6 |
CVE-2024-11101 | 2024-11-12T04:15:05.080 | A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/search-invoices.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/7"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-invoices.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/O... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-invoices.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/7/comments | 0 | 2024-11-11T06:42:21Z | 2024-11-11T06:42:21Z | https://github.com/Hacker0xOne/CVE/issues/7 | 2,648,326,184 | 7 |
CVE-2024-11256 | 2024-11-15T20:15:17.957 | A vulnerability was found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/8"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Portfolio Management System MCA Project using PHP and MySQL
## Vendor Homepage
+ https://1000projects.org/portfolio-management-system-mca-project-using-php-and-mysql.html
# AFFECT... | 100projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /login.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/8/comments | 0 | 2024-11-13T15:28:48Z | 2024-11-13T15:28:48Z | https://github.com/Hacker0xOne/CVE/issues/8 | 2,655,878,252 | 8 |
CVE-2024-11257 | 2024-11-15T20:15:18.253 | A vulnerability classified as critical has been found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/forgot-password.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/10"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/forgot-password.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/O... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/forgot-password.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/10/comments | 0 | 2024-11-13T15:44:08Z | 2024-11-13T15:44:10Z | https://github.com/Hacker0xOne/CVE/issues/10 | 2,655,936,915 | 10 |
CVE-2024-11258 | 2024-11-15T20:15:18.523 | A vulnerability classified as critical was found in 1000 Projects Beauty Parlour Management System 1.0. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/11"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/11 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR FIXED VER... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/index.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/11/comments | 0 | 2024-11-13T15:46:44Z | 2024-11-13T15:46:44Z | https://github.com/Hacker0xOne/CVE/issues/11 | 2,655,946,469 | 11 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.