cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
997
cve_metrics
dict
cve_references
listlengths
1
68
cve_configurations
listlengths
1
5
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
76 values
url
stringlengths
37
79
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
128M
2.84B
issue_number
int64
1
128k
CVE-2024-11261
2024-11-15T22:15:14.970
A vulnerability, which was classified as critical, was found in SourceCodester Student Record Management System 1.0. Affected is an unknown function of the file StudentRecordManagementSystem.cpp of the component Number of Students Menu. The manipulation leads to memory corruption. Attacking locally is a requirement. Th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/12" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "119" ]
119
https://github.com/Hacker0xone/CVE/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# **SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Validation Vulnerability** ## **Vulnerability Name** + **Input Validation Vulnerability** ## **Vulnerability Description** In the Student Record Management System program, improper input validation allows for unexpected beh...
SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Validation Vulnerability
https://api.github.com/repos/Hacker0xOne/CVE/issues/12/comments
0
2024-11-14T01:43:13Z
2024-11-14T08:34:54Z
https://github.com/Hacker0xOne/CVE/issues/12
2,657,271,678
12
CVE-2024-11262
2024-11-15T23:15:10.270
A vulnerability has been found in SourceCodester Student Record Management System 1.0 and classified as critical. Affected by this vulnerability is the function main of the component View All Student Marks. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/13" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.284719" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/Hacker0xone/CVE/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# **Student Record Management System in C++ with Source Code V1.0 - Stack-based Buffer Overflow Vulnerabilities** **Project Name:** Student Record Management System in C++ **Vulnerability Name:** Stack-based Buffer Overflow Vulnerabilities **Vulnerability Type:** Buffer Overflow **Severity Level:** High ...
Student Record Management System in C++ with Source Code V1.0 - Stack-based Buffer Overflow Vulnerabilities
https://api.github.com/repos/Hacker0xOne/CVE/issues/13/comments
0
2024-11-14T08:37:09Z
2024-11-14T08:39:40Z
https://github.com/Hacker0xOne/CVE/issues/13
2,658,025,307
13
CVE-2024-11488
2024-11-20T17:15:14.097
A vulnerability was found in 115cms up to 20240807 and classified as problematic. This issue affects some unknown processing of the file /app/admin/view/web_user.html. The manipulation of the argument ks leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/70" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.285503" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:115cms:115cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "03950909-1057-4645-B3D9-0592C6550912", "versionEndExcluding": null, "versionEndIncluding": "2024-08-07", "versionStartExcl...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/70
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary 115cms v8 version 20240807 is affected by multiple reflected Cross-Site Scripting (XSS) vulnerabilities. These vulnerabilities occur due to insufficient input validation and sanitation, allowing attackers to inject malicious scripts into web pages that are then executed in the browsers of other users. http...
Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in 115cms v8 20240807
https://api.github.com/repos/Hebing123/cve/issues/70/comments
1
2024-09-05T06:15:05Z
2024-11-21T09:32:15Z
https://github.com/Hebing123/cve/issues/70
2,506,863,968
70
CVE-2024-11587
2024-11-21T13:15:03.803
A vulnerability was found in idcCMS 1.60. It has been classified as problematic. This affects the function GetCityOptionJs of the file /inc/classProvCity.php. The manipulation of the argument idName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the publ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/75" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.285657" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:idccms:idccms:1.60:*:*:*:*:*:*:*", "matchCriteriaId": "EDEAEBA4-6D6F-466A-805A-4CA739290434", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/75
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A reflected Cross Site Scripting (XSS) vulnerability exists in idcCMS V1.60 due to improper sanitization of the $idName parameter in `/inc/classProvCity.php`. # Details idcCMS V1.60 suffers from a Reflected Cross Site Scripting (XSS) vulnerability due to improper sanitization of the $idName parameter wit...
idcCMS V1.60 has a reflected XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/75/comments
1
2024-11-12T11:32:29Z
2024-11-21T09:26:12Z
https://github.com/Hebing123/cve/issues/75
2,651,919,647
75
CVE-2024-11591
2024-11-21T14:15:08.713
A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument sername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/14" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-services.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR F...
1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-services.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/14/comments
0
2024-11-16T14:03:31Z
2024-11-16T14:03:32Z
https://github.com/Hacker0xOne/CVE/issues/14
2,664,404,665
14
CVE-2024-11592
2024-11-21T15:15:25.003
A vulnerability has been found in 1000 Projects Beauty Parlour Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/about-us.php. The manipulation of the argument pagetitle leads to sql injection. The attack can be initiated remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/15" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/about-us.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR FIXED...
100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/about-us.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/15/comments
0
2024-11-16T14:09:11Z
2024-11-16T14:09:11Z
https://github.com/Hacker0xOne/CVE/issues/15
2,664,412,163
15
CVE-2024-11646
2024-11-25T00:15:03.743
A vulnerability classified as critical was found in 1000 Projects Beauty Parlour Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit-services.php. The manipulation of the argument sername leads to sql injection. The attack can be launched remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/33" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/33
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-services.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR F...
100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-services.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/33/comments
0
2024-11-18T11:54:46Z
2024-11-18T11:54:46Z
https://github.com/ppp-src/CVE/issues/33
2,668,312,231
33
CVE-2024-11647
2024-11-25T01:15:04.033
A vulnerability, which was classified as critical, has been found in 1000 Projects Beauty Parlour Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. The manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/34" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/34
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/view-appointment.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/...
1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/view-appointment.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/34/comments
0
2024-11-18T11:58:53Z
2024-11-18T11:58:53Z
https://github.com/ppp-src/CVE/issues/34
2,668,322,809
34
CVE-2024-11673
2024-11-25T23:15:04.280
A vulnerability, which was classified as problematic, has been found in 1000 Projects Bookstore Management System 1.0. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/16" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "352" ]
352
https://github.com/Hacker0xone/CVE/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# **Vulnerability Report** + **1000projects Bookstore Management System PHP MySQL Project V1.0 - Cross-Site Request Forgery (CSRF)** ## **Vulnerability Name** + Cross-Site Request Forgery (CSRF) ## **Basic Information** - **Target System**: Bookstore Management System - **Tested Parameter**: `s` + *...
1000projects Bookstore Management System PHP MySQL Project V1.0 - Cross-Site Request Forgery (CSRF)
https://api.github.com/repos/Hacker0xOne/CVE/issues/16/comments
0
2024-11-20T03:42:49Z
2024-11-20T03:42:49Z
https://github.com/Hacker0xOne/CVE/issues/16
2,674,235,113
16
CVE-2024-12180
2024-12-04T22:15:22.140
A vulnerability classified as problematic has been found in DedeCMS 5.7.116. Affected is an unknown function of the file /member/article_add.php. The manipulation of the argument body leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be use...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/76" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.286902" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8", "versionEndExcluding": "5.7.116", "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/76
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A stored Cross-Site Scripting (XSS) vulnerability has been identified in the DedeCMS V5.7.116 content management system. The vulnerability exists due to insufficient filtering of the `body` parameter in the `/member/article_add.php` script. This issue allows an attacker to inject malicious scripts into artic...
DedeCMS V5.7.116 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/76/comments
1
2024-11-27T07:03:17Z
2024-12-06T02:28:49Z
https://github.com/Hebing123/cve/issues/76
2,697,386,582
76
CVE-2024-12181
2024-12-04T22:15:22.360
A vulnerability classified as problematic was found in DedeCMS 5.7.116. Affected by this vulnerability is an unknown functionality of the file /member/uploads_add.php of the component SWF File Handler. The manipulation of the argument mediatype leads to cross site scripting. The attack can be launched remotely. The exp...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/77" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.286903" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8", "versionEndExcluding": "5.7.116", "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/77
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary DedeCMS V5.7.116 is affected by a stored cross-site scripting vulnerability that can be exploited by an attacker to upload a malicious SWF file, which can lead to XSS attacks. This vulnerability exists due to insufficient input validation and sanitization of user-supplied data. # Details Log in and go to...
DedeCMS V5.7.116 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/77/comments
1
2024-11-27T08:15:37Z
2024-12-06T02:29:05Z
https://github.com/Hebing123/cve/issues/77
2,697,588,984
77
CVE-2024-12182
2024-12-04T23:15:04.703
A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7.116. Affected by this issue is some unknown functionality of the file /member/soft_add.php. The manipulation of the argument body leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/78" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.286904" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8", "versionEndExcluding": "5.7.116", "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/78
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A stored Cross-Site Scripting (XSS) vulnerability has been identified in the DedeCMS V5.7.116 content management system. The vulnerability exists due to insufficient filtering of the `body` parameter in the `/member/soft_add.php` script. This issue allows an attacker to inject malicious scripts into softwa...
DedeCMS V5.7.116 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/78/comments
1
2024-11-27T09:33:27Z
2024-12-06T02:29:22Z
https://github.com/Hebing123/cve/issues/78
2,697,823,090
78
CVE-2024-12183
2024-12-04T23:15:05.760
A vulnerability, which was classified as problematic, was found in DedeCMS 5.7.116. This affects the function RemoveXSS of the file /plus/carbuyaction.php of the component HTTP POST Request Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/79" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.286905" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8", "versionEndExcluding": "5.7.116", "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/79
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A stored XSS vulnerability has been identified in DedeCMS V5.7.116. Attackers can exploit this vulnerability by maliciously inserting an XSS payload in the comment section during the purchase of goods. # Details The vulnerability is located in the file `plus/carbuyaction.php`. Our analysis indicates that ...
DedeCMS V5.7.116 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/79/comments
1
2024-11-28T03:04:01Z
2024-12-06T02:29:41Z
https://github.com/Hebing123/cve/issues/79
2,700,547,563
79
CVE-2024-12234
2024-12-05T17:15:11.213
A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-customer-detailed.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/17" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-customer-detailed.php SQL injection ## NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html ## AFFEC...
1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-customer-detailed.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/17/comments
0
2024-12-04T09:23:20Z
2024-12-04T09:23:20Z
https://github.com/Hacker0xOne/CVE/issues/17
2,717,081,474
17
CVE-2024-38921
2024-12-06T22:15:19.600
Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter`/amcl z_rand ` .
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4379" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "416" ]
416
https://github.com/ros-navigation/navigation2/issues/4379
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repositor...
18 bugs (UAF) in `nav2_amcl` by setting dynamic parameters
https://api.github.com/repos/ros-navigation/navigation2/issues/4379/comments
6
2024-05-30T14:43:04Z
2024-06-05T16:47:20Z
https://github.com/ros-navigation/navigation2/issues/4379
2,325,854,595
4,379
CVE-2024-38922
2024-12-06T22:15:19.720
Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a heap overflow in the nav2_amcl process. This vulnerability is triggered via sending a crafted message to the component /initialpose.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/open-navigation/navigation2/issues/4307" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/ros-navigation/navigation2/issues/4294
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
validate msg onto `/initialpose` would result in a stack-buffer-overflow bug in `nav2_amcl`
https://api.github.com/repos/ros-navigation/navigation2/issues/4294/comments
1
2024-05-03T12:07:57Z
2024-05-09T05:44:07Z
https://github.com/ros-navigation/navigation2/issues/4294
2,277,546,456
4,294
CVE-2024-41644
2024-12-06T22:15:20.450
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via the dyn_param_handler_ component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4496" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4496
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
Completely shutdown dynamic_param callback threads instead of only `dyn_param_handler_.reset()`
https://api.github.com/repos/ros-navigation/navigation2/issues/4496/comments
5
2024-06-26T07:35:14Z
2024-08-30T06:45:24Z
https://github.com/ros-navigation/navigation2/issues/4496
2,374,591,094
4,496
CVE-2024-41645
2024-12-06T22:15:20.563
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2__amcl.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4497" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4497
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
## Bug report **Required Info:** - Operating System: - <!-- OS and version (e.g. Windows 10, Ubuntu 16.04...) --> ubuntu 22.04 - ROS2 Version: - <!-- ROS2 distribution and install method (e.g. Foxy binaries, Dashing source...) --> humble - Version or commit hash: - <!-- from source: output of `git -C ...
[nav2_costmap] UAF bug caused by incomplete closed `dynamicParametersCallback` thread in `Inflation_layer_`
https://api.github.com/repos/ros-navigation/navigation2/issues/4497/comments
1
2024-06-26T07:51:11Z
2024-06-27T15:20:35Z
https://github.com/ros-navigation/navigation2/issues/4497
2,374,628,765
4,497
CVE-2024-41646
2024-12-06T22:15:20.683
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_dwb_controller.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4437" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4437
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right reposit...
NullPtr bug during the `getRobotPose()` calculation of `costmap_ros_` in `nav2_controller`
https://api.github.com/repos/ros-navigation/navigation2/issues/4437/comments
4
2024-06-14T20:22:16Z
2024-06-24T17:40:52Z
https://github.com/ros-navigation/navigation2/issues/4437
2,354,037,707
4,437
CVE-2024-41647
2024-12-06T22:15:20.807
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_mppi_controller.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4436" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "732" ]
732
https://github.com/ros-navigation/navigation2/issues/4436
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
NullPtr bug during the `computeVelocityCommands()` during shutdown
https://api.github.com/repos/ros-navigation/navigation2/issues/4436/comments
5
2024-06-14T18:04:35Z
2024-06-24T17:40:36Z
https://github.com/ros-navigation/navigation2/issues/4436
2,353,847,380
4,436
CVE-2024-41648
2024-12-06T22:15:20.920
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_regulated_pure_pursuit_controller.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4438" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4438
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repositor...
NullPtr bug during the `computeVelocityCommands()` calculation of `nav2_regulated_pure_pursuit_controller`
https://api.github.com/repos/ros-navigation/navigation2/issues/4438/comments
1
2024-06-14T21:09:26Z
2024-06-18T08:54:37Z
https://github.com/ros-navigation/navigation2/issues/4438
2,354,120,170
4,438
CVE-2024-41650
2024-12-06T22:15:21.163
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_costmap_2d.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4489" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4489
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
## Bug report **Required Info:** - Operating System: - <!-- OS and version (e.g. Windows 10, Ubuntu 16.04...) --> ubuntu 22.04 - ROS2 Version: - <!-- ROS2 distribution and install method (e.g. Foxy binaries, Dashing source...) --> humble - Version or commit hash: - <!-- from source: output of `git -C ...
[nav2_costmap] UAF bug caused by the exit mechanism flaw in class `ClearCostmapService`
https://api.github.com/repos/ros-navigation/navigation2/issues/4489/comments
1
2024-06-25T10:24:22Z
2024-06-26T16:32:10Z
https://github.com/ros-navigation/navigation2/issues/4489
2,372,307,138
4,489
CVE-2024-44853
2024-12-06T22:15:21.390
Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component computeControl().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4547" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/ros-navigation/navigation2/issues/4547
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right reposit...
[nav2_controller] nullPtr bug during `comupteControl()`
https://api.github.com/repos/ros-navigation/navigation2/issues/4547/comments
0
2024-07-21T06:48:05Z
2024-07-22T17:05:48Z
https://github.com/ros-navigation/navigation2/issues/4547
2,421,255,890
4,547
CVE-2024-44854
2024-12-06T22:15:21.500
Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component smoothPlan().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4538" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/ros-navigation/navigation2/issues/4538
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
[nav2_smoother] nullptr bug during `smooth_plan()`
https://api.github.com/repos/ros-navigation/navigation2/issues/4538/comments
3
2024-07-16T20:02:08Z
2024-07-19T16:44:40Z
https://github.com/ros-navigation/navigation2/issues/4538
2,411,949,445
4,538
CVE-2024-44856
2024-12-06T22:15:21.753
Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component nav2_smac_planner().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4468" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/ros-navigation/navigation2/issues/4468
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right reposit...
NullPointer Accessed during `findCircumscribedCost` calculation of nav2_smac_planner
https://api.github.com/repos/ros-navigation/navigation2/issues/4468/comments
1
2024-06-24T13:09:15Z
2024-06-24T13:09:36Z
https://github.com/ros-navigation/navigation2/issues/4468
2,370,218,387
4,468
CVE-2024-12841
2024-12-20T19:15:06.097
A vulnerability was found in Emlog Pro up to 2.4.1. It has been classified as problematic. This affects an unknown part of the file /admin/tag.php. The manipulation of the argument keyword leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/emlog/emlog/issues/305" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.289077" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28", "versionEndExcluding": null, "versionEndIncluding": "2.4.1", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/305
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "emlog", "emlog" ]
# Summary emlog pro 2.4.1 is affected by multiple reflected Cross-Site Scripting (XSS) vulnerabilities. These vulnerabilities occur due to insufficient input validation and sanitation, allowing attackers to inject malicious scripts into web pages that are then executed in the browsers of other users. # Details This...
Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in emlog pro 2.4.1
https://api.github.com/repos/emlog/emlog/issues/305/comments
0
2024-12-13T02:55:33Z
2024-12-23T08:01:19Z
https://github.com/emlog/emlog/issues/305
2,737,265,718
305
CVE-2024-12845
2024-12-20T22:15:24.727
A vulnerability classified as problematic was found in Emlog Pro up to 2.4.1. Affected by this vulnerability is an unknown functionality in the library /include/lib/common.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/emlog/emlog/issues/306" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.289081" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28", "versionEndExcluding": null, "versionEndIncluding": "2.4.1", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/306
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "emlog", "emlog" ]
# Summary A reflected Cross Site Scripting (XSS) vulnerability exists in emlog pro 2.4.1 due to improper sanitization of the $msg parameter in /include/lib/common.php. # Details This vulnerability can be exploited by an attacker to inject malicious scripts into the web application, which can then be executed in the ...
emlog pro 2.4.1 has a reflected XSS vulnerability
https://api.github.com/repos/emlog/emlog/issues/306/comments
0
2024-12-13T04:00:15Z
2024-12-23T08:01:11Z
https://github.com/emlog/emlog/issues/306
2,737,341,754
306
CVE-2024-12846
2024-12-21T05:15:07.373
A vulnerability, which was classified as problematic, has been found in Emlog Pro up to 2.4.1. Affected by this issue is some unknown functionality of the file /admin/link.php. The manipulation of the argument siteurl/icon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/307" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.289082" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "B449A14E-7C7E-4541-95AB-C2E55846E4D3", "versionEndExcluding": "2.4.1", "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/307
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Summary A stored XSS vulnerability exists in emlog pro 2.4.1 which allows attackers to execute arbitrary HTML code. # Details Because `/admin/link.php` has CSRF problems, attackers can use XSS to cooperate with CSRF to attack. The `siteurl` and `icon` parameters have XSS vulnerabilities. ![image](https://githu...
emlog pro 2.4.1 Stored XSS Vulnerability
https://api.github.com/repos/emlog/emlog/issues/307/comments
0
2024-12-13T06:53:57Z
2024-12-23T08:00:59Z
https://github.com/emlog/emlog/issues/307
2,737,587,217
307
CVE-2024-13008
2024-12-29T10:15:05.853
A vulnerability has been found in code-projects Responsive Hotel Site 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/newsletter.php. The manipulation of the argument eid leads to sql injection. The attack can be launched remotely. The exploit has been discl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Err-4O4/cve/issues/1" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection # eidOF AFFECTED PRODUCT(S) + Responsive Hotel Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/responsive-hotel-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submit...
code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/18/comments
0
2024-12-28T03:56:11Z
2024-12-28T03:56:12Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/18
2,761,422,178
18
CVE-2024-13132
2025-01-05T05:15:06.400
A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and ma...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/309" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/309#issue-275531...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/309
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Description Emlog pro 2.4.3 is vulnerable to XSS in admin/article.php # Root Cause The server retrieves the parameters passed by the browser, concatenates them to form a URL address, and then returns it to the browser ![image](https://github.com/user-attachments/assets/329541e0-1639-4e36-ba4d-95f1b004d441) #...
emlog pro 2.4.3 has a reflected XSS vulnerability in article.php
https://api.github.com/repos/emlog/emlog/issues/309/comments
0
2024-12-23T06:21:09Z
2024-12-23T06:21:09Z
https://github.com/emlog/emlog/issues/309
2,755,317,359
309
CVE-2024-13132
2025-01-05T05:15:06.400
A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and ma...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/309" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/309#issue-275531...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/309#issue-2755317359
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Description Emlog pro 2.4.3 is vulnerable to XSS in admin/article.php # Root Cause The server retrieves the parameters passed by the browser, concatenates them to form a URL address, and then returns it to the browser ![image](https://github.com/user-attachments/assets/329541e0-1639-4e36-ba4d-95f1b004d441) #...
emlog pro 2.4.3 has a reflected XSS vulnerability in article.php
https://api.github.com/repos/emlog/emlog/issues/309/comments
0
2024-12-23T06:21:09Z
2024-12-23T06:21:09Z
https://github.com/emlog/emlog/issues/309
2,755,317,359
309
CVE-2024-13135
2025-01-05T09:15:05.240
A vulnerability has been found in Emlog Pro 2.4.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/twitter.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/311" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/311#issue-275540...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:2.4.3:*:*:*:pro:*:*:*", "matchCriteriaId": "790999A9-DC94-42E9-B5B3-CA10F4BF0E0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/emlog/emlog/issues/311
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Description Emlog pro 2.4.3 is vulnerable to XSS in admin/twitter.php.Attackers can add malicious JavaScript scripts to the URL, and the server will concatenate the malicious scripts into the URL and return them to the browser, ultimately causing XSS vulnerabilities # Root Case The server retrieves the parameter...
emlog pro 2.4.3 has a reflected XSS vulnerability in twitter.php
https://api.github.com/repos/emlog/emlog/issues/311/comments
0
2024-12-23T07:24:38Z
2024-12-23T07:24:38Z
https://github.com/emlog/emlog/issues/311
2,755,404,584
311
CVE-2024-13135
2025-01-05T09:15:05.240
A vulnerability has been found in Emlog Pro 2.4.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/twitter.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/311" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/311#issue-275540...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:2.4.3:*:*:*:pro:*:*:*", "matchCriteriaId": "790999A9-DC94-42E9-B5B3-CA10F4BF0E0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/emlog/emlog/issues/311#issue-2755404584
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Description Emlog pro 2.4.3 is vulnerable to XSS in admin/twitter.php.Attackers can add malicious JavaScript scripts to the URL, and the server will concatenate the malicious scripts into the URL and return them to the browser, ultimately causing XSS vulnerabilities # Root Case The server retrieves the parameter...
emlog pro 2.4.3 has a reflected XSS vulnerability in twitter.php
https://api.github.com/repos/emlog/emlog/issues/311/comments
0
2024-12-23T07:24:38Z
2024-12-23T07:24:38Z
https://github.com/emlog/emlog/issues/311
2,755,404,584
311
CVE-2024-13140
2025-01-05T12:15:05.473
A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/312" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/312#issue-275854...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/312
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Summary An XSS vulnerability has been discovered in emlog pro 2.4.3. The vulnerability stems from the fact that `/admin/article.php` does not filter malicious SVG files. This vulnerability allows an attacker with content editing permissions to exploit the system by uploading an SVG file containing malicious XML code...
emlog pro 2.4.3 Stored XSS Vulnerability in /admin/article.php
https://api.github.com/repos/emlog/emlog/issues/312/comments
0
2024-12-25T06:37:01Z
2024-12-25T06:37:01Z
https://github.com/emlog/emlog/issues/312
2,758,546,837
312
CVE-2024-13140
2025-01-05T12:15:05.473
A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/312" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/312#issue-275854...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/312#issue-2758546837
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Summary An XSS vulnerability has been discovered in emlog pro 2.4.3. The vulnerability stems from the fact that `/admin/article.php` does not filter malicious SVG files. This vulnerability allows an attacker with content editing permissions to exploit the system by uploading an SVG file containing malicious XML code...
emlog pro 2.4.3 Stored XSS Vulnerability in /admin/article.php
https://api.github.com/repos/emlog/emlog/issues/312/comments
0
2024-12-25T06:37:01Z
2024-12-25T06:37:01Z
https://github.com/emlog/emlog/issues/312
2,758,546,837
312
CVE-2024-13141
2025-01-05T15:15:17.257
A vulnerability classified as problematic was found in osuuu LightPicture up to 1.2.2. This vulnerability affects unknown code of the file /api/upload of the component SVG File Upload Handler. The manipulation of the argument file leads to cross site scripting. The attack can be initiated remotely. The exploit has been...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/83" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.290224" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:osuuu:lightpicture:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD1EF5E0-DD84-4D9A-8408-482F1BFDB5BC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/83
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary osuuu LightPicture 1.2.2 version is vulnerable to a stored Cross-Site Scripting (XSS) attack. The vulnerability exists in the system's settings where users with the ability to upload images are allowed to upload SVG files by default. # Details The vulnerability arises because the system does not sufficient...
osuuu LightPicture 1.2.2 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/83/comments
0
2024-12-25T03:18:08Z
2024-12-25T03:21:40Z
https://github.com/Hebing123/cve/issues/83
2,758,447,373
83
CVE-2025-0540
2025-01-17T21:15:11.037
A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-sou...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expadd.php SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/1/comments
0
2025-01-13T07:05:01Z
2025-01-23T09:32:03Z
https://github.com/magic2353112890/cve/issues/1
2,783,182,077
1
CVE-2024-50664
2025-01-23T22:15:13.667
gpac 2.4 contains a heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2988" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "42CFA40F-9987-4AB6-B61F-DAA3D8E7CB64", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2988
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Dear developers, We found the following heap buffer overflow bug on gpac(version 2.4), please confirm. The latest master branch and version 2.4 both have this bug. ### Version ```shell MP4Box - GPAC version 2.4-rev0-g5d70253ac-HEAD ``` ### ASAN Log Fuzz Trigger command 1: ./b...
heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box
https://api.github.com/repos/gpac/gpac/issues/2988/comments
0
2024-10-07T12:09:15Z
2024-10-09T11:45:53Z
https://github.com/gpac/gpac/issues/2988
2,570,257,093
2,988
CVE-2024-50665
2025-01-23T22:15:13.790
gpac 2.4 contains a SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2987" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "42CFA40F-9987-4AB6-B61F-DAA3D8E7CB64", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2987
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Dear developers, We found the following segmentation violation bug on gpac(version 2.4), please confirm. This may be due to a Segmentation violation caused by dereferencing a null pointer, which can sometimes lead to a crash. The latest master branch and version 2.4 both have this bug. ```...
SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box
https://api.github.com/repos/gpac/gpac/issues/2987/comments
1
2024-10-07T11:17:35Z
2024-10-09T11:45:53Z
https://github.com/gpac/gpac/issues/2987
2,570,129,601
2,987
CVE-2025-0872
2025-01-30T16:15:30.737
A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file /addpayment.php. The manipulation of the argument id/amount/desc/inccat leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addpayment.php POST parameter SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-proj...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addpayment.php POST parameter SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/3/comments
0
2025-01-23T07:47:55Z
2025-01-23T08:59:52Z
https://github.com/magic2353112890/cve/issues/3
2,806,173,967
3
CVE-2025-0873
2025-01-30T17:15:18.293
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /customeredit.php. The manipulation of the argument id/address/fullname/phonenumber/email/city/comment leads to sql injection. The attack can be launch...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeredit.php POST parameter SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-pr...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeredit.php POST parameter SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/5/comments
0
2025-01-23T09:15:17Z
2025-01-23T09:16:01Z
https://github.com/magic2353112890/cve/issues/5
2,806,348,566
5
CVE-2025-0874
2025-01-30T18:15:33.753
A vulnerability, which was classified as critical, has been found in code-projects Simple Plugins Car Rental Management 1.0. Affected by this issue is some unknown functionality of the file /admin/approve.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit h...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/8" }, { "source": "cna@vuldb.com"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D80D0581-09FD-4CE1-9327-CF580DF49354", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
> # code-projects Simple Car Rental System In PHP With Source Code v1.0 approve.php SQL injection > # usernameOF AFFECTED PRODUCT(S) > * Restaurant Order System In PHP With Source Code > > ## Vendor Homepage > * https://code-projects.org/simple-car-rental-system-in-php-with-source-code/ > > # AFFECTED AND/OR FIXED VE...
code-projects Simple Car Rental System In PHP With Source Code v1.0 approve.php SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/8/comments
0
2025-01-24T07:22:59Z
2025-01-24T07:24:54Z
https://github.com/magic2353112890/cve/issues/8
2,808,718,469
8
CVE-2025-0943
2025-02-01T11:15:08.457
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file deldoc.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 Multiple php files found GET type SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 Multiple php files found GET type SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/7/comments
0
2025-01-24T06:07:35Z
2025-01-24T06:09:28Z
https://github.com/magic2353112890/cve/issues/7
2,808,585,275
7
CVE-2025-0981
2025-02-18T10:15:10.333
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript in the description field, which captures the session cookie of authenti...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7245" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/7245
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** 🔴 **High** (CWE-287: Improper Authentication) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-0981)___ #### **Authorization Required** - Administrator #### **Description** A vulnerability exists in **ChurchCRM** that allows an attacker to hijack a user's sess...
Bug: (CVE-2025-0981) - Session Hijacking via Stored Cross-Site Scripting (XSS) in Group Editor
https://api.github.com/repos/ChurchCRM/CRM/issues/7245/comments
1
2025-02-03T10:29:17Z
2025-03-06T05:24:14Z
https://github.com/ChurchCRM/CRM/issues/7245
2,827,107,053
7,245
CVE-2025-1023
2025-02-18T10:15:10.500
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The newCountName parameter is directly concatenated into an SQL query without proper sanitization, allowing an a...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7246" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7246
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1023)___ #### **Authorization Required** - Administrator or a user with permission to list `event types` #### **Description**...
Bug: (CVE-2025-1023) - SQL Injection in newCountName Parameter via EditEventTypes.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7246/comments
3
2025-02-04T10:46:36Z
2025-03-10T14:18:51Z
https://github.com/ChurchCRM/CRM/issues/7246
2,829,779,628
7,246
CVE-2025-1024
2025-02-19T09:15:10.280
A vulnerability exists in ChurchCRM 5.13.0 that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookie...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7250" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/7250
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** 🔴 **High** (CWE-79: Improper Neutralization of Input During Web Page Generation) - ___A CVE will be assigned once the vendor reviews the issue (CVE-2025-1024)___ #### **Authorization Required:** - Administrator #### **Description:** A vulnerability exists in **ChurchCRM 5.13.0** that allows...
Bug: (CVE-2025-1024) - Session Hijacking via Reflected Cross-Site Scripting (XSS) in EditEventAttendees.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7250/comments
1
2025-02-08T04:20:22Z
2025-03-11T02:44:40Z
https://github.com/ChurchCRM/CRM/issues/7250
2,839,503,293
7,250
CVE-2025-1132
2025-02-19T09:15:10.417
A time-based blind SQL Injection vulnerability exists in the ChurchCRM 5.13.0 and prior EditEventAttendees.php within the EN_tyid parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7251" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7251
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the application team reviews the issue (CVE-2025-1132)___ #### **Authorization Required:** - Administrator or authenticated user access required to view the `EventEditor...
Bug: (CVE-2025-1132) - SQL Injection in EN_tyid Parameter via EditEventAttendees.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7251/comments
1
2025-02-08T04:22:40Z
2025-03-11T02:44:39Z
https://github.com/ChurchCRM/CRM/issues/7251
2,839,506,809
7,251
CVE-2025-1133
2025-02-19T09:15:10.550
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection vulnerability in the EditEventAttendees functionality. The EID parameter is directly concatenated into an SQL query without proper sanitization, making it susce...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7252" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7252
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1133)___ #### **Authorization Required:** - Administrator access required to view `EditEventAttendees.php`. #### **Descri...
Bug: (CVE-2025-1133) - SQL Injection in EID Parameter via EditEventAttendees.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7252/comments
1
2025-02-08T04:23:57Z
2025-03-11T02:44:38Z
https://github.com/ChurchCRM/CRM/issues/7252
2,839,508,441
7,252
CVE-2025-1134
2025-02-19T09:15:10.687
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the DonatedItemEditor functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficie...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7253" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7253
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
**Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1134)___ #### **Authorization Required:** - Administrator access required to view `DonatedItemEditor.php`. #### **Description:...
Bug: (CVE-2025-1134) - SQL Injection in CurrentFundraiser Parameter via DonatedItemEditor.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7253/comments
0
2025-02-08T04:27:56Z
2025-03-05T14:09:20Z
https://github.com/ChurchCRM/CRM/issues/7253
2,839,513,942
7,253
CVE-2025-1135
2025-02-19T09:15:10.823
A vulnerability exists in ChurchCRM 5.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the BatchWinnerEntry functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficie...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7254" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7254
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1135)___ #### **Authorization Required** - Administrator access required to view `BatchWinnerEntry.php`. #### **Description...
Bug: (CVE-2025-1135) - SQL Injection in CurrentFundraiser Parameter via BatchWinnerEntry.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7254/comments
0
2025-02-08T04:29:55Z
2025-03-05T14:09:20Z
https://github.com/ChurchCRM/CRM/issues/7254
2,839,516,802
7,254