cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 997 | cve_metrics dict | cve_references listlengths 1 68 | cve_configurations listlengths 1 5 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 76
values | url stringlengths 37 79 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 128M 2.84B | issue_number int64 1 128k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-11261 | 2024-11-15T22:15:14.970 | A vulnerability, which was classified as critical, was found in SourceCodester Student Record Management System 1.0. Affected is an unknown function of the file StudentRecordManagementSystem.cpp of the component Number of Students Menu. The manipulation leads to memory corruption. Attacking locally is a requirement. Th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/12"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"119"
] | 119 | https://github.com/Hacker0xone/CVE/issues/12 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # **SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Validation Vulnerability**
## **Vulnerability Name**
+ **Input Validation Vulnerability**
## **Vulnerability Description**
In the Student Record Management System program, improper input validation allows for unexpected beh... | SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Validation Vulnerability | https://api.github.com/repos/Hacker0xOne/CVE/issues/12/comments | 0 | 2024-11-14T01:43:13Z | 2024-11-14T08:34:54Z | https://github.com/Hacker0xOne/CVE/issues/12 | 2,657,271,678 | 12 |
CVE-2024-11262 | 2024-11-15T23:15:10.270 | A vulnerability has been found in SourceCodester Student Record Management System 1.0 and classified as critical. Affected by this vulnerability is the function main of the component View All Student Marks. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/13"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.284719"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/Hacker0xone/CVE/issues/13 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # **Student Record Management System in C++ with Source Code V1.0 - Stack-based Buffer Overflow Vulnerabilities**
**Project Name:** Student Record Management System in C++
**Vulnerability Name:** Stack-based Buffer Overflow Vulnerabilities
**Vulnerability Type:** Buffer Overflow
**Severity Level:** High
... | Student Record Management System in C++ with Source Code V1.0 - Stack-based Buffer Overflow Vulnerabilities | https://api.github.com/repos/Hacker0xOne/CVE/issues/13/comments | 0 | 2024-11-14T08:37:09Z | 2024-11-14T08:39:40Z | https://github.com/Hacker0xOne/CVE/issues/13 | 2,658,025,307 | 13 |
CVE-2024-11488 | 2024-11-20T17:15:14.097 | A vulnerability was found in 115cms up to 20240807 and classified as problematic. This issue affects some unknown processing of the file /app/admin/view/web_user.html. The manipulation of the argument ks leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/70"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.285503"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:115cms:115cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03950909-1057-4645-B3D9-0592C6550912",
"versionEndExcluding": null,
"versionEndIncluding": "2024-08-07",
"versionStartExcl... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/70 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
115cms v8 version 20240807 is affected by multiple reflected Cross-Site Scripting (XSS) vulnerabilities.
These vulnerabilities occur due to insufficient input validation and sanitation, allowing attackers to inject malicious scripts into web pages that are then executed in the browsers of other users.
http... | Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in 115cms v8 20240807 | https://api.github.com/repos/Hebing123/cve/issues/70/comments | 1 | 2024-09-05T06:15:05Z | 2024-11-21T09:32:15Z | https://github.com/Hebing123/cve/issues/70 | 2,506,863,968 | 70 |
CVE-2024-11587 | 2024-11-21T13:15:03.803 | A vulnerability was found in idcCMS 1.60. It has been classified as problematic. This affects the function GetCityOptionJs of the file /inc/classProvCity.php. The manipulation of the argument idName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/75"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.285657"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:idccms:idccms:1.60:*:*:*:*:*:*:*",
"matchCriteriaId": "EDEAEBA4-6D6F-466A-805A-4CA739290434",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/75 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A reflected Cross Site Scripting (XSS) vulnerability exists in idcCMS V1.60 due to improper sanitization of the $idName parameter in `/inc/classProvCity.php`.
# Details
idcCMS V1.60 suffers from a Reflected Cross Site Scripting (XSS) vulnerability due to improper sanitization of the $idName parameter wit... | idcCMS V1.60 has a reflected XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/75/comments | 1 | 2024-11-12T11:32:29Z | 2024-11-21T09:26:12Z | https://github.com/Hebing123/cve/issues/75 | 2,651,919,647 | 75 |
CVE-2024-11591 | 2024-11-21T14:15:08.713 | A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument sername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/14"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-services.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR F... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-services.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/14/comments | 0 | 2024-11-16T14:03:31Z | 2024-11-16T14:03:32Z | https://github.com/Hacker0xOne/CVE/issues/14 | 2,664,404,665 | 14 |
CVE-2024-11592 | 2024-11-21T15:15:25.003 | A vulnerability has been found in 1000 Projects Beauty Parlour Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/about-us.php. The manipulation of the argument pagetitle leads to sql injection. The attack can be initiated remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/15"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/about-us.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR FIXED... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/about-us.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/15/comments | 0 | 2024-11-16T14:09:11Z | 2024-11-16T14:09:11Z | https://github.com/Hacker0xOne/CVE/issues/15 | 2,664,412,163 | 15 |
CVE-2024-11646 | 2024-11-25T00:15:03.743 | A vulnerability classified as critical was found in 1000 Projects Beauty Parlour Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit-services.php. The manipulation of the argument sername leads to sql injection. The attack can be launched remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/33"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/33 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-services.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR F... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-services.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/33/comments | 0 | 2024-11-18T11:54:46Z | 2024-11-18T11:54:46Z | https://github.com/ppp-src/CVE/issues/33 | 2,668,312,231 | 33 |
CVE-2024-11647 | 2024-11-25T01:15:04.033 | A vulnerability, which was classified as critical, has been found in 1000 Projects Beauty Parlour Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. The manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/34"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/34 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/view-appointment.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/view-appointment.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/34/comments | 0 | 2024-11-18T11:58:53Z | 2024-11-18T11:58:53Z | https://github.com/ppp-src/CVE/issues/34 | 2,668,322,809 | 34 |
CVE-2024-11673 | 2024-11-25T23:15:04.280 | A vulnerability, which was classified as problematic, has been found in 1000 Projects Bookstore Management System 1.0. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/16"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"352"
] | 352 | https://github.com/Hacker0xone/CVE/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # **Vulnerability Report**
+ **1000projects Bookstore Management System PHP MySQL Project V1.0 - Cross-Site Request Forgery (CSRF)**
## **Vulnerability Name**
+ Cross-Site Request Forgery (CSRF)
## **Basic Information**
- **Target System**: Bookstore Management System
- **Tested Parameter**: `s`
+ *... | 1000projects Bookstore Management System PHP MySQL Project V1.0 - Cross-Site Request Forgery (CSRF) | https://api.github.com/repos/Hacker0xOne/CVE/issues/16/comments | 0 | 2024-11-20T03:42:49Z | 2024-11-20T03:42:49Z | https://github.com/Hacker0xOne/CVE/issues/16 | 2,674,235,113 | 16 |
CVE-2024-12180 | 2024-12-04T22:15:22.140 | A vulnerability classified as problematic has been found in DedeCMS 5.7.116. Affected is an unknown function of the file /member/article_add.php. The manipulation of the argument body leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be use... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/76"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.286902"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8",
"versionEndExcluding": "5.7.116",
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/76 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A stored Cross-Site Scripting (XSS) vulnerability has been identified in the DedeCMS V5.7.116 content management system. The vulnerability exists due to insufficient filtering of the `body` parameter in the `/member/article_add.php` script. This issue allows an attacker to inject malicious scripts into artic... | DedeCMS V5.7.116 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/76/comments | 1 | 2024-11-27T07:03:17Z | 2024-12-06T02:28:49Z | https://github.com/Hebing123/cve/issues/76 | 2,697,386,582 | 76 |
CVE-2024-12181 | 2024-12-04T22:15:22.360 | A vulnerability classified as problematic was found in DedeCMS 5.7.116. Affected by this vulnerability is an unknown functionality of the file /member/uploads_add.php of the component SWF File Handler. The manipulation of the argument mediatype leads to cross site scripting. The attack can be launched remotely. The exp... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/77"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.286903"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8",
"versionEndExcluding": "5.7.116",
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/77 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
DedeCMS V5.7.116 is affected by a stored cross-site scripting vulnerability that can be exploited by an attacker to upload a malicious SWF file, which can lead to XSS attacks. This vulnerability exists due to insufficient input validation and sanitization of user-supplied data.
# Details
Log in and go to... | DedeCMS V5.7.116 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/77/comments | 1 | 2024-11-27T08:15:37Z | 2024-12-06T02:29:05Z | https://github.com/Hebing123/cve/issues/77 | 2,697,588,984 | 77 |
CVE-2024-12182 | 2024-12-04T23:15:04.703 | A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7.116. Affected by this issue is some unknown functionality of the file /member/soft_add.php. The manipulation of the argument body leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/78"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.286904"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8",
"versionEndExcluding": "5.7.116",
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/78 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A stored Cross-Site Scripting (XSS) vulnerability has been identified in the DedeCMS V5.7.116 content management system. The vulnerability exists due to insufficient filtering of the `body` parameter in the `/member/soft_add.php` script.
This issue allows an attacker to inject malicious scripts into softwa... | DedeCMS V5.7.116 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/78/comments | 1 | 2024-11-27T09:33:27Z | 2024-12-06T02:29:22Z | https://github.com/Hebing123/cve/issues/78 | 2,697,823,090 | 78 |
CVE-2024-12183 | 2024-12-04T23:15:05.760 | A vulnerability, which was classified as problematic, was found in DedeCMS 5.7.116. This affects the function RemoveXSS of the file /plus/carbuyaction.php of the component HTTP POST Request Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/79"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.286905"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8",
"versionEndExcluding": "5.7.116",
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/79 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A stored XSS vulnerability has been identified in DedeCMS V5.7.116.
Attackers can exploit this vulnerability by maliciously inserting an XSS payload in the comment section during the purchase of goods.
# Details
The vulnerability is located in the file `plus/carbuyaction.php`. Our analysis indicates that ... | DedeCMS V5.7.116 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/79/comments | 1 | 2024-11-28T03:04:01Z | 2024-12-06T02:29:41Z | https://github.com/Hebing123/cve/issues/79 | 2,700,547,563 | 79 |
CVE-2024-12234 | 2024-12-05T17:15:11.213 | A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-customer-detailed.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/17"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/17 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-customer-detailed.php SQL injection
## NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
## AFFEC... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-customer-detailed.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/17/comments | 0 | 2024-12-04T09:23:20Z | 2024-12-04T09:23:20Z | https://github.com/Hacker0xOne/CVE/issues/17 | 2,717,081,474 | 17 |
CVE-2024-38921 | 2024-12-06T22:15:19.600 | Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter`/amcl z_rand ` . | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4379"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"416"
] | 416 | https://github.com/ros-navigation/navigation2/issues/4379 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repositor... | 18 bugs (UAF) in `nav2_amcl` by setting dynamic parameters | https://api.github.com/repos/ros-navigation/navigation2/issues/4379/comments | 6 | 2024-05-30T14:43:04Z | 2024-06-05T16:47:20Z | https://github.com/ros-navigation/navigation2/issues/4379 | 2,325,854,595 | 4,379 |
CVE-2024-38922 | 2024-12-06T22:15:19.720 | Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a heap overflow in the nav2_amcl process. This vulnerability is triggered via sending a crafted message to the component /initialpose. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/open-navigation/navigation2/issues/4307"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/ros-navigation/navigation2/issues/4294 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | validate msg onto `/initialpose` would result in a stack-buffer-overflow bug in `nav2_amcl` | https://api.github.com/repos/ros-navigation/navigation2/issues/4294/comments | 1 | 2024-05-03T12:07:57Z | 2024-05-09T05:44:07Z | https://github.com/ros-navigation/navigation2/issues/4294 | 2,277,546,456 | 4,294 |
CVE-2024-41644 | 2024-12-06T22:15:20.450 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via the dyn_param_handler_ component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4496"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4496 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | Completely shutdown dynamic_param callback threads instead of only `dyn_param_handler_.reset()` | https://api.github.com/repos/ros-navigation/navigation2/issues/4496/comments | 5 | 2024-06-26T07:35:14Z | 2024-08-30T06:45:24Z | https://github.com/ros-navigation/navigation2/issues/4496 | 2,374,591,094 | 4,496 |
CVE-2024-41645 | 2024-12-06T22:15:20.563 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2__amcl. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4497"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4497 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | ## Bug report
**Required Info:**
- Operating System:
- <!-- OS and version (e.g. Windows 10, Ubuntu 16.04...) --> ubuntu 22.04
- ROS2 Version:
- <!-- ROS2 distribution and install method (e.g. Foxy binaries, Dashing source...) --> humble
- Version or commit hash:
- <!-- from source: output of `git -C ... | [nav2_costmap] UAF bug caused by incomplete closed `dynamicParametersCallback` thread in `Inflation_layer_` | https://api.github.com/repos/ros-navigation/navigation2/issues/4497/comments | 1 | 2024-06-26T07:51:11Z | 2024-06-27T15:20:35Z | https://github.com/ros-navigation/navigation2/issues/4497 | 2,374,628,765 | 4,497 |
CVE-2024-41646 | 2024-12-06T22:15:20.683 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_dwb_controller. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4437"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4437 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right reposit... | NullPtr bug during the `getRobotPose()` calculation of `costmap_ros_` in `nav2_controller` | https://api.github.com/repos/ros-navigation/navigation2/issues/4437/comments | 4 | 2024-06-14T20:22:16Z | 2024-06-24T17:40:52Z | https://github.com/ros-navigation/navigation2/issues/4437 | 2,354,037,707 | 4,437 |
CVE-2024-41647 | 2024-12-06T22:15:20.807 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_mppi_controller. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4436"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"732"
] | 732 | https://github.com/ros-navigation/navigation2/issues/4436 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | NullPtr bug during the `computeVelocityCommands()` during shutdown | https://api.github.com/repos/ros-navigation/navigation2/issues/4436/comments | 5 | 2024-06-14T18:04:35Z | 2024-06-24T17:40:36Z | https://github.com/ros-navigation/navigation2/issues/4436 | 2,353,847,380 | 4,436 |
CVE-2024-41648 | 2024-12-06T22:15:20.920 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_regulated_pure_pursuit_controller. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4438"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4438 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repositor... | NullPtr bug during the `computeVelocityCommands()` calculation of `nav2_regulated_pure_pursuit_controller` | https://api.github.com/repos/ros-navigation/navigation2/issues/4438/comments | 1 | 2024-06-14T21:09:26Z | 2024-06-18T08:54:37Z | https://github.com/ros-navigation/navigation2/issues/4438 | 2,354,120,170 | 4,438 |
CVE-2024-41650 | 2024-12-06T22:15:21.163 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_costmap_2d. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4489"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4489 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | ## Bug report
**Required Info:**
- Operating System:
- <!-- OS and version (e.g. Windows 10, Ubuntu 16.04...) --> ubuntu 22.04
- ROS2 Version:
- <!-- ROS2 distribution and install method (e.g. Foxy binaries, Dashing source...) --> humble
- Version or commit hash:
- <!-- from source: output of `git -C ... | [nav2_costmap] UAF bug caused by the exit mechanism flaw in class `ClearCostmapService` | https://api.github.com/repos/ros-navigation/navigation2/issues/4489/comments | 1 | 2024-06-25T10:24:22Z | 2024-06-26T16:32:10Z | https://github.com/ros-navigation/navigation2/issues/4489 | 2,372,307,138 | 4,489 |
CVE-2024-44853 | 2024-12-06T22:15:21.390 | Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component computeControl(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4547"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/ros-navigation/navigation2/issues/4547 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right reposit... | [nav2_controller] nullPtr bug during `comupteControl()` | https://api.github.com/repos/ros-navigation/navigation2/issues/4547/comments | 0 | 2024-07-21T06:48:05Z | 2024-07-22T17:05:48Z | https://github.com/ros-navigation/navigation2/issues/4547 | 2,421,255,890 | 4,547 |
CVE-2024-44854 | 2024-12-06T22:15:21.500 | Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component smoothPlan(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4538"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/ros-navigation/navigation2/issues/4538 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | [nav2_smoother] nullptr bug during `smooth_plan()` | https://api.github.com/repos/ros-navigation/navigation2/issues/4538/comments | 3 | 2024-07-16T20:02:08Z | 2024-07-19T16:44:40Z | https://github.com/ros-navigation/navigation2/issues/4538 | 2,411,949,445 | 4,538 |
CVE-2024-44856 | 2024-12-06T22:15:21.753 | Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component nav2_smac_planner(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4468"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/ros-navigation/navigation2/issues/4468 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right reposit... | NullPointer Accessed during `findCircumscribedCost` calculation of nav2_smac_planner | https://api.github.com/repos/ros-navigation/navigation2/issues/4468/comments | 1 | 2024-06-24T13:09:15Z | 2024-06-24T13:09:36Z | https://github.com/ros-navigation/navigation2/issues/4468 | 2,370,218,387 | 4,468 |
CVE-2024-12841 | 2024-12-20T19:15:06.097 | A vulnerability was found in Emlog Pro up to 2.4.1. It has been classified as problematic. This affects an unknown part of the file /admin/tag.php. The manipulation of the argument keyword leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/emlog/emlog/issues/305"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.289077"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.1",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/305 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"emlog",
"emlog"
] | # Summary
emlog pro 2.4.1 is affected by multiple reflected Cross-Site Scripting (XSS) vulnerabilities.
These vulnerabilities occur due to insufficient input validation and sanitation, allowing attackers to inject malicious scripts into web pages that are then executed in the browsers of other users.
# Details
This... | Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in emlog pro 2.4.1 | https://api.github.com/repos/emlog/emlog/issues/305/comments | 0 | 2024-12-13T02:55:33Z | 2024-12-23T08:01:19Z | https://github.com/emlog/emlog/issues/305 | 2,737,265,718 | 305 |
CVE-2024-12845 | 2024-12-20T22:15:24.727 | A vulnerability classified as problematic was found in Emlog Pro up to 2.4.1. Affected by this vulnerability is an unknown functionality in the library /include/lib/common.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/emlog/emlog/issues/306"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.289081"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.1",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/306 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"emlog",
"emlog"
] | # Summary
A reflected Cross Site Scripting (XSS) vulnerability exists in emlog pro 2.4.1 due to improper sanitization of the $msg parameter in /include/lib/common.php.
# Details
This vulnerability can be exploited by an attacker to inject malicious scripts into the web application, which can then be executed in the ... | emlog pro 2.4.1 has a reflected XSS vulnerability | https://api.github.com/repos/emlog/emlog/issues/306/comments | 0 | 2024-12-13T04:00:15Z | 2024-12-23T08:01:11Z | https://github.com/emlog/emlog/issues/306 | 2,737,341,754 | 306 |
CVE-2024-12846 | 2024-12-21T05:15:07.373 | A vulnerability, which was classified as problematic, has been found in Emlog Pro up to 2.4.1. Affected by this issue is some unknown functionality of the file /admin/link.php. The manipulation of the argument siteurl/icon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/307"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.289082"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "B449A14E-7C7E-4541-95AB-C2E55846E4D3",
"versionEndExcluding": "2.4.1",
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/307 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Summary
A stored XSS vulnerability exists in emlog pro 2.4.1 which allows attackers to execute arbitrary HTML code.
# Details
Because `/admin/link.php` has CSRF problems, attackers can use XSS to cooperate with CSRF to attack.
The `siteurl` and `icon` parameters have XSS vulnerabilities.

+ Responsive Hotel Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/responsive-hotel-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submit... | code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/18/comments | 0 | 2024-12-28T03:56:11Z | 2024-12-28T03:56:12Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/18 | 2,761,422,178 | 18 |
CVE-2024-13132 | 2025-01-05T05:15:06.400 | A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/309"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/309#issue-275531... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.3",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/309 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Description
Emlog pro 2.4.3 is vulnerable to XSS in admin/article.php
# Root Cause
The server retrieves the parameters passed by the browser, concatenates them to form a URL address, and then returns it to the browser

#... | emlog pro 2.4.3 has a reflected XSS vulnerability in article.php | https://api.github.com/repos/emlog/emlog/issues/309/comments | 0 | 2024-12-23T06:21:09Z | 2024-12-23T06:21:09Z | https://github.com/emlog/emlog/issues/309 | 2,755,317,359 | 309 |
CVE-2024-13132 | 2025-01-05T05:15:06.400 | A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/309"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/309#issue-275531... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.3",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/309#issue-2755317359 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Description
Emlog pro 2.4.3 is vulnerable to XSS in admin/article.php
# Root Cause
The server retrieves the parameters passed by the browser, concatenates them to form a URL address, and then returns it to the browser

#... | emlog pro 2.4.3 has a reflected XSS vulnerability in article.php | https://api.github.com/repos/emlog/emlog/issues/309/comments | 0 | 2024-12-23T06:21:09Z | 2024-12-23T06:21:09Z | https://github.com/emlog/emlog/issues/309 | 2,755,317,359 | 309 |
CVE-2024-13135 | 2025-01-05T09:15:05.240 | A vulnerability has been found in Emlog Pro 2.4.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/twitter.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/311"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/311#issue-275540... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:2.4.3:*:*:*:pro:*:*:*",
"matchCriteriaId": "790999A9-DC94-42E9-B5B3-CA10F4BF0E0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/311 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Description
Emlog pro 2.4.3 is vulnerable to XSS in admin/twitter.php.Attackers can add malicious JavaScript scripts to the URL, and the server will concatenate the malicious scripts into the URL and return them to the browser, ultimately causing XSS vulnerabilities
# Root Case
The server retrieves the parameter... | emlog pro 2.4.3 has a reflected XSS vulnerability in twitter.php | https://api.github.com/repos/emlog/emlog/issues/311/comments | 0 | 2024-12-23T07:24:38Z | 2024-12-23T07:24:38Z | https://github.com/emlog/emlog/issues/311 | 2,755,404,584 | 311 |
CVE-2024-13135 | 2025-01-05T09:15:05.240 | A vulnerability has been found in Emlog Pro 2.4.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/twitter.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/311"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/311#issue-275540... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:2.4.3:*:*:*:pro:*:*:*",
"matchCriteriaId": "790999A9-DC94-42E9-B5B3-CA10F4BF0E0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/311#issue-2755404584 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Description
Emlog pro 2.4.3 is vulnerable to XSS in admin/twitter.php.Attackers can add malicious JavaScript scripts to the URL, and the server will concatenate the malicious scripts into the URL and return them to the browser, ultimately causing XSS vulnerabilities
# Root Case
The server retrieves the parameter... | emlog pro 2.4.3 has a reflected XSS vulnerability in twitter.php | https://api.github.com/repos/emlog/emlog/issues/311/comments | 0 | 2024-12-23T07:24:38Z | 2024-12-23T07:24:38Z | https://github.com/emlog/emlog/issues/311 | 2,755,404,584 | 311 |
CVE-2024-13140 | 2025-01-05T12:15:05.473 | A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/312"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/312#issue-275854... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.3",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/312 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Summary
An XSS vulnerability has been discovered in emlog pro 2.4.3. The vulnerability stems from the fact that `/admin/article.php` does not filter malicious SVG files. This vulnerability allows an attacker with content editing permissions to exploit the system by uploading an SVG file containing malicious XML code... | emlog pro 2.4.3 Stored XSS Vulnerability in /admin/article.php | https://api.github.com/repos/emlog/emlog/issues/312/comments | 0 | 2024-12-25T06:37:01Z | 2024-12-25T06:37:01Z | https://github.com/emlog/emlog/issues/312 | 2,758,546,837 | 312 |
CVE-2024-13140 | 2025-01-05T12:15:05.473 | A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/312"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/312#issue-275854... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.3",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/312#issue-2758546837 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Summary
An XSS vulnerability has been discovered in emlog pro 2.4.3. The vulnerability stems from the fact that `/admin/article.php` does not filter malicious SVG files. This vulnerability allows an attacker with content editing permissions to exploit the system by uploading an SVG file containing malicious XML code... | emlog pro 2.4.3 Stored XSS Vulnerability in /admin/article.php | https://api.github.com/repos/emlog/emlog/issues/312/comments | 0 | 2024-12-25T06:37:01Z | 2024-12-25T06:37:01Z | https://github.com/emlog/emlog/issues/312 | 2,758,546,837 | 312 |
CVE-2024-13141 | 2025-01-05T15:15:17.257 | A vulnerability classified as problematic was found in osuuu LightPicture up to 1.2.2. This vulnerability affects unknown code of the file /api/upload of the component SVG File Upload Handler. The manipulation of the argument file leads to cross site scripting. The attack can be initiated remotely. The exploit has been... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/83"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.290224"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osuuu:lightpicture:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1EF5E0-DD84-4D9A-8408-482F1BFDB5BC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/83 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
osuuu LightPicture 1.2.2 version is vulnerable to a stored Cross-Site Scripting (XSS) attack. The vulnerability exists in the system's settings where users with the ability to upload images are allowed to upload SVG files by default.
# Details
The vulnerability arises because the system does not sufficient... | osuuu LightPicture 1.2.2 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/83/comments | 0 | 2024-12-25T03:18:08Z | 2024-12-25T03:21:40Z | https://github.com/Hebing123/cve/issues/83 | 2,758,447,373 | 83 |
CVE-2025-0540 | 2025-01-17T21:15:11.037 | A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-sou... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expadd.php SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/1/comments | 0 | 2025-01-13T07:05:01Z | 2025-01-23T09:32:03Z | https://github.com/magic2353112890/cve/issues/1 | 2,783,182,077 | 1 |
CVE-2024-50664 | 2025-01-23T22:15:13.667 | gpac 2.4 contains a heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2988"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "42CFA40F-9987-4AB6-B61F-DAA3D8E7CB64",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nu... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2988 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | ### Description
Dear developers,
We found the following heap buffer overflow bug on gpac(version 2.4), please confirm.
The latest master branch and version 2.4 both have this bug.
### Version
```shell
MP4Box - GPAC version 2.4-rev0-g5d70253ac-HEAD
```
### ASAN Log
Fuzz Trigger command 1:
./b... | heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box | https://api.github.com/repos/gpac/gpac/issues/2988/comments | 0 | 2024-10-07T12:09:15Z | 2024-10-09T11:45:53Z | https://github.com/gpac/gpac/issues/2988 | 2,570,257,093 | 2,988 |
CVE-2024-50665 | 2025-01-23T22:15:13.790 | gpac 2.4 contains a SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2987"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "42CFA40F-9987-4AB6-B61F-DAA3D8E7CB64",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nu... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/2987 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | ### Description
Dear developers,
We found the following segmentation violation bug on gpac(version 2.4), please confirm.
This may be due to a Segmentation violation caused by dereferencing a null pointer, which can sometimes lead to a crash.
The latest master branch and version 2.4 both have this bug.
```... | SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box | https://api.github.com/repos/gpac/gpac/issues/2987/comments | 1 | 2024-10-07T11:17:35Z | 2024-10-09T11:45:53Z | https://github.com/gpac/gpac/issues/2987 | 2,570,129,601 | 2,987 |
CVE-2025-0872 | 2025-01-30T16:15:30.737 | A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file /addpayment.php. The manipulation of the argument id/amount/desc/inccat leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addpayment.php POST parameter SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-proj... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addpayment.php POST parameter SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/3/comments | 0 | 2025-01-23T07:47:55Z | 2025-01-23T08:59:52Z | https://github.com/magic2353112890/cve/issues/3 | 2,806,173,967 | 3 |
CVE-2025-0873 | 2025-01-30T17:15:18.293 | A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /customeredit.php. The manipulation of the argument id/address/fullname/phonenumber/email/city/comment leads to sql injection. The attack can be launch... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeredit.php POST parameter SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-pr... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeredit.php POST parameter SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/5/comments | 0 | 2025-01-23T09:15:17Z | 2025-01-23T09:16:01Z | https://github.com/magic2353112890/cve/issues/5 | 2,806,348,566 | 5 |
CVE-2025-0874 | 2025-01-30T18:15:33.753 | A vulnerability, which was classified as critical, has been found in code-projects Simple Plugins Car Rental Management 1.0. Affected by this issue is some unknown functionality of the file /admin/approve.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit h... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/8"
},
{
"source": "cna@vuldb.com"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D80D0581-09FD-4CE1-9327-CF580DF49354",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | > # code-projects Simple Car Rental System In PHP With Source Code v1.0 approve.php SQL injection
> # usernameOF AFFECTED PRODUCT(S)
> * Restaurant Order System In PHP With Source Code
>
> ## Vendor Homepage
> * https://code-projects.org/simple-car-rental-system-in-php-with-source-code/
>
> # AFFECTED AND/OR FIXED VE... | code-projects Simple Car Rental System In PHP With Source Code v1.0 approve.php SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/8/comments | 0 | 2025-01-24T07:22:59Z | 2025-01-24T07:24:54Z | https://github.com/magic2353112890/cve/issues/8 | 2,808,718,469 | 8 |
CVE-2025-0943 | 2025-02-01T11:15:08.457 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file deldoc.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/magic2353112890/cve/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/magic2353112890/cve/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"magic2353112890",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 Multiple php files found GET type SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 Multiple php files found GET type SQL injection | https://api.github.com/repos/magic2353112890/cve/issues/7/comments | 0 | 2025-01-24T06:07:35Z | 2025-01-24T06:09:28Z | https://github.com/magic2353112890/cve/issues/7 | 2,808,585,275 | 7 |
CVE-2025-0981 | 2025-02-18T10:15:10.333 | A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript in the description field, which captures the session cookie of authenti... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7245"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartEx... | [
"79"
] | 79 | https://github.com/ChurchCRM/CRM/issues/7245 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] |
#### **Severity:**
🔴 **High** (CWE-287: Improper Authentication)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-0981)___
#### **Authorization Required**
- Administrator
#### **Description**
A vulnerability exists in **ChurchCRM** that allows an attacker to hijack a user's sess... | Bug: (CVE-2025-0981) - Session Hijacking via Stored Cross-Site Scripting (XSS) in Group Editor | https://api.github.com/repos/ChurchCRM/CRM/issues/7245/comments | 1 | 2025-02-03T10:29:17Z | 2025-03-06T05:24:14Z | https://github.com/ChurchCRM/CRM/issues/7245 | 2,827,107,053 | 7,245 |
CVE-2025-1023 | 2025-02-18T10:15:10.500 | A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The newCountName parameter is directly concatenated into an SQL query without proper sanitization, allowing an a... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7246"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartEx... | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7246 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1023)___
#### **Authorization Required**
- Administrator or a user with permission to list `event types`
#### **Description**... | Bug: (CVE-2025-1023) - SQL Injection in newCountName Parameter via EditEventTypes.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7246/comments | 3 | 2025-02-04T10:46:36Z | 2025-03-10T14:18:51Z | https://github.com/ChurchCRM/CRM/issues/7246 | 2,829,779,628 | 7,246 |
CVE-2025-1024 | 2025-02-19T09:15:10.280 | A vulnerability exists in ChurchCRM 5.13.0 that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookie... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7250"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartEx... | [
"79"
] | 79 | https://github.com/ChurchCRM/CRM/issues/7250 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
🔴 **High** (CWE-79: Improper Neutralization of Input During Web Page Generation)
- ___A CVE will be assigned once the vendor reviews the issue (CVE-2025-1024)___
#### **Authorization Required:**
- Administrator
#### **Description:**
A vulnerability exists in **ChurchCRM 5.13.0** that allows... | Bug: (CVE-2025-1024) - Session Hijacking via Reflected Cross-Site Scripting (XSS) in EditEventAttendees.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7250/comments | 1 | 2025-02-08T04:20:22Z | 2025-03-11T02:44:40Z | https://github.com/ChurchCRM/CRM/issues/7250 | 2,839,503,293 | 7,250 |
CVE-2025-1132 | 2025-02-19T09:15:10.417 | A time-based blind SQL Injection vulnerability exists in the ChurchCRM 5.13.0 and prior EditEventAttendees.php within the EN_tyid parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7251"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartEx... | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7251 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the application team reviews the issue (CVE-2025-1132)___
#### **Authorization Required:**
- Administrator or authenticated user access required to view the `EventEditor... | Bug: (CVE-2025-1132) - SQL Injection in EN_tyid Parameter via EditEventAttendees.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7251/comments | 1 | 2025-02-08T04:22:40Z | 2025-03-11T02:44:39Z | https://github.com/ChurchCRM/CRM/issues/7251 | 2,839,506,809 | 7,251 |
CVE-2025-1133 | 2025-02-19T09:15:10.550 | A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection vulnerability in the EditEventAttendees functionality. The EID parameter is directly concatenated into an SQL query without proper sanitization, making it susce... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7252"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartEx... | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7252 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1133)___
#### **Authorization Required:**
- Administrator access required to view `EditEventAttendees.php`.
#### **Descri... | Bug: (CVE-2025-1133) - SQL Injection in EID Parameter via EditEventAttendees.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7252/comments | 1 | 2025-02-08T04:23:57Z | 2025-03-11T02:44:38Z | https://github.com/ChurchCRM/CRM/issues/7252 | 2,839,508,441 | 7,252 |
CVE-2025-1134 | 2025-02-19T09:15:10.687 | A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the DonatedItemEditor functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficie... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7253"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartEx... | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7253 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1134)___
#### **Authorization Required:**
- Administrator access required to view `DonatedItemEditor.php`.
#### **Description:... | Bug: (CVE-2025-1134) - SQL Injection in CurrentFundraiser Parameter via DonatedItemEditor.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7253/comments | 0 | 2025-02-08T04:27:56Z | 2025-03-05T14:09:20Z | https://github.com/ChurchCRM/CRM/issues/7253 | 2,839,513,942 | 7,253 |
CVE-2025-1135 | 2025-02-19T09:15:10.823 | A vulnerability exists in ChurchCRM 5.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the BatchWinnerEntry functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficie... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/7254"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2",
"versionEndExcluding": null,
"versionEndIncluding": "5.13.0",
"versionStartEx... | [
"89"
] | 89 | https://github.com/ChurchCRM/CRM/issues/7254 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | #### **Severity:**
⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command)
- ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1135)___
#### **Authorization Required**
- Administrator access required to view `BatchWinnerEntry.php`.
#### **Description... | Bug: (CVE-2025-1135) - SQL Injection in CurrentFundraiser Parameter via BatchWinnerEntry.php | https://api.github.com/repos/ChurchCRM/CRM/issues/7254/comments | 0 | 2025-02-08T04:29:55Z | 2025-03-05T14:09:20Z | https://github.com/ChurchCRM/CRM/issues/7254 | 2,839,516,802 | 7,254 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.