cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-24146 | 2024-02-29T01:44:11.657 | A memory leak issue discovered in parseSWF_DEFINEBUTTON in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/307"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"401"
] | 401 | https://github.com/libming/libming/issues/307 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang vers... | Memory leaks on parseSWF_DEFINEBUTTON | https://api.github.com/repos/libming/libming/issues/307/comments | 1 | 2024-01-12T22:46:35Z | 2024-02-21T22:35:18Z | https://github.com/libming/libming/issues/307 | 2,079,829,395 | 307 | 5,996 |
CVE-2024-24147 | 2024-02-29T01:44:11.693 | A memory leak issue discovered in parseSWF_FILLSTYLEARRAY in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/311"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"401"
] | 401 | https://github.com/libming/libming/issues/311 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang vers... | Memory leaks on parseSWF_FILLSTYLEARRAY | https://api.github.com/repos/libming/libming/issues/311/comments | 1 | 2024-01-13T00:00:25Z | 2024-02-21T22:33:33Z | https://github.com/libming/libming/issues/311 | 2,079,901,582 | 311 | 5,997 |
CVE-2024-24149 | 2024-02-29T01:44:11.737 | A memory leak issue discovered in parseSWF_GLYPHENTRY in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"401"
] | 401 | https://github.com/libming/libming/issues/310 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang vers... | Memory leaks on parseSWF_GLYPHENTRY | https://api.github.com/repos/libming/libming/issues/310/comments | 1 | 2024-01-12T23:51:34Z | 2024-02-21T22:35:36Z | https://github.com/libming/libming/issues/310 | 2,079,896,237 | 310 | 5,998 |
CVE-2024-24150 | 2024-02-29T01:44:11.777 | A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"401"
] | 401 | https://github.com/libming/libming/issues/309 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ### Envrionment
```bash
ubuntu ~/lab/libming/util master lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/libming/util master clang -v
Ubuntu clang vers... | Memory leaks on parseSWF_TEXTRECORD | https://api.github.com/repos/libming/libming/issues/309/comments | 1 | 2024-01-12T23:44:59Z | 2024-02-21T22:47:44Z | https://github.com/libming/libming/issues/309 | 2,079,890,770 | 309 | 5,999 |
CVE-2024-24155 | 2024-02-29T01:44:11.810 | Bento4 v1.5.1-628 contains a Memory leak on AP4_Movie::AP4_Movie, parsing tracks and added into m_Tracks list, but mp42aac cannot correctly delete when we got an no audio track found error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/919"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*",
"matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"401"
] | 401 | https://github.com/axiomatic-systems/Bento4/issues/919 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | ### Envrionment
```bash
ubuntu ~/lab/Bento4-clean/cmakebuild ◈ v1.5.1-628 lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 22.04.2 LTS
Release: 22.04
Codename: jammy
```
### Compiler
```bash
ubuntu ~/lab/Bento4-clean/cmakebuild ◈ v1.5.1-628... | Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks | https://api.github.com/repos/axiomatic-systems/Bento4/issues/919/comments | 1 | 2024-01-13T21:23:38Z | 2024-02-21T22:47:29Z | https://github.com/axiomatic-systems/Bento4/issues/919 | 2,080,480,764 | 919 | 6,000 |
CVE-2024-27517 | 2024-02-29T01:44:20.180 | Webasyst 2.9.9 has a Cross-Site Scripting (XSS) vulnerability, Attackers can create blogs containing malicious code after gaining blog permissions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/webasyst/webasyst-framework/issues/377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"V... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webasyst:webasyst:2.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "89182418-CDDF-40D0-B2FD-683C1AD2CDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/webasyst/webasyst-framework/issues/377 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"webasyst",
"webasyst-framework"
] | ### **Summary**
Webasyst 2.9.9 has a storage XSS vulnerability,Attackers can create blogs containing malicious code after gaining blog permissions, and even administrators only need to open the page of the blog management function (instead of the specified blog) to be triggered!
### **Details**
 function at /bits/shared_ptr_base.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/qpdf/qpdf/issues/1123"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fe... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qpdf_project:qpdf:11.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8567C78-2FB2-4365-9A94-F2E2B896AAB7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"787"
] | 787 | https://github.com/qpdf/qpdf/issues/1123 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"qpdf",
"qpdf"
] | ### Description
I found a heap-buffer-overflow crash when I use this instruction:
```shell
/qpdf/build/qpdf/qpdf --json-input POC_qpdf11-9-0_heap-buffer-overflow output_json.pdf
#Changed the name of id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 to POC_qpdf11-9-0_heap-buffe... | qpdf11.9.0 found a heap-buffer-overflow crash | https://api.github.com/repos/qpdf/qpdf/issues/1123/comments | 4 | 2024-01-15T02:29:15Z | 2024-02-04T23:10:11Z | https://github.com/qpdf/qpdf/issues/1123 | 2,081,133,505 | 1,123 | 6,002 |
CVE-2024-25865 | 2024-03-02T22:15:50.293 | Cross Site Scripting (XSS) vulnerability in hexo-theme-anzhiyu v1.6.12, allows remote attackers to execute arbitrary code via the algolia search function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anzhiyu-c:hexo-theme-anzhiyu:1.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "771C3906-072E-404B-9559-6DC3722B8C67",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"79"
] | 79 | https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"anzhiyu-c",
"hexo-theme-anzhiyu"
] | ### 使用的 AnZhiYu 版本? | What version of AnZhiYu are you use?
1.6.12
### 使用的浏览器? || What browse are you using?
Chrome
### 是否修改过主题文件? || Has the theme files been modified?
不是 (No)
### 使用的系统? || What operating system are you using?
Windows
### 问题描述 | Describe the bug
## 1、hexo博客搭建
- 安装node.js和... | [Bug]: anzhiyu主题开启algolia搜索功能存在xss漏洞 | https://api.github.com/repos/anzhiyu-c/hexo-theme-anzhiyu/issues/200/comments | 1 | 2024-02-09T12:26:44Z | 2024-02-09T14:10:32Z | https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200 | 2,127,036,392 | 200 | 6,003 |
CVE-2019-25210 | 2024-03-03T21:15:49.867 | An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/helm/helm/issues/7275"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://helm.sh/blog/response-cve-2019-25210/"
},
{
"source": "cve@mitre.org",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:helm:helm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "606B3397-0482-45AB-9683-716665632036",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null... | [
"200"
] | 200 | https://github.com/helm/helm/issues/7275 | [
"Issue Tracking"
] | github.com | [
"helm",
"helm"
] | <!-- If you need help or think you have found a bug, please help us with your issue by entering the following information (otherwise you can delete this text): -->
Output of `helm version`:
`helm version
version.BuildInfo{Version:"v3.0.2", GitCommit:"19e47ee3283ae98139d98460de796c1be1e3975f", GitTreeState:"clean... | helm 3 shows secrets with --dry-run option in clear text | https://api.github.com/repos/helm/helm/issues/7275/comments | 64 | 2019-12-19T21:19:04Z | 2024-05-14T17:53:00Z | https://github.com/helm/helm/issues/7275 | 540,573,246 | 7,275 | 6,004 |
CVE-2024-28757 | 2024-03-10T05:15:06.570 | libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Release Notes"
],
"url": "http://www.openwall.com/lists/oss-security/2024/03/15/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "463A4DD2-9DA6-420C-A361-293B1166B9C6",
"versionEndExcluding": "2.6.2",
"versionEndIncluding": null,
"versionSt... | [
"776"
] | 776 | https://github.com/libexpat/libexpat/issues/839 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"libexpat",
"libexpat"
] | # Issue
This is the public side of soon-public (access protected) oss-fuzz Expat finding:
[Issue 66812: expat:xml_parse_fuzzer_UTF-16: Timeout in xml_parse_fuzzer_UTF-16](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=66812).
The three key (access protected) contained links are:
- Detailed Report: http... | OSS-Fuzz/ClusterFuzz finding 66812 | https://api.github.com/repos/libexpat/libexpat/issues/839/comments | 8 | 2024-03-03T22:40:00Z | 2024-03-21T19:48:19Z | https://github.com/libexpat/libexpat/issues/839 | 2,165,602,679 | 839 | 6,005 |
CVE-2024-2564 | 2024-03-17T14:15:06.973 | A vulnerability was found in PandaXGO PandaX up to 20240310 and classified as critical. This issue affects the function ExportUser of the file /apps/system/api/user.go. The manipulation of the argument filename leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/PandaXGO/PandaX/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.257063"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pandax:pandax:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09811585-2FBA-46CC-95B6-684FDADF7CA3",
"versionEndExcluding": null,
"versionEndIncluding": "2024-03-10",
"versionStartExcl... | [
"24"
] | 24 | https://github.com/PandaXGO/PandaX/issues/6 | [
"Issue Tracking"
] | github.com | [
"PandaXGO",
"PandaX"
] | # pandax excel 导出任意文件覆盖 或 任意文件下载
<https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/user.go#L153-L161>
<https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/role.go#L84-L92>
<https://github.com/PandaXGO/PandaX/blob... | pandax excel 导出 任意文件覆盖 或 任意文件下载 | https://api.github.com/repos/PandaXGO/PandaX/issues/6/comments | 1 | 2024-03-10T03:34:17Z | 2024-12-04T09:34:30Z | https://github.com/PandaXGO/PandaX/issues/6 | 2,177,505,961 | 6 | 6,007 |
CVE-2024-2690 | 2024-03-20T10:15:11.250 | A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been classified as critical. Affected is an unknown function of the file /uupdate.php. The manipulation of the argument ima leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wkeyi0x1/vul-report/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.257388"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/wkeyi0x1/vul-report/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wkeyi0x1",
"vul-report"
] | # Online Discussion Forum Site - Arbitrary file vulnerability uploading leads to command execution
+ Author: liwenjie
# Vendor Homepage
+ https://www.sourcecodester.com/php/14233/online-discussion-forum-site.html
# Software Link
+ https://www.sourcecodester.com/download-code?nid=14233&title=Online+Discussion+Forum... | Online Discussion Forum Site - Arbitrary file vulnerability uploading leads to command execution - NEW VUL | https://api.github.com/repos/wkeyi0x1/vul-report/issues/2/comments | 0 | 2024-03-19T17:57:09Z | 2024-03-19T17:57:09Z | https://github.com/wkeyi0x1/vul-report/issues/2 | 2,195,621,125 | 2 | 6,008 |
CVE-2024-23643 | 2024-03-20T18:15:09.047 | GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.2 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in th... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/GeoWebCache/geowebcache/commit/9d010e09c784690ada8af43f594461a2553a62f0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F58354C1-10A5-4A55-8A22-7DADEEC5ED15",
"versionEndExcluding": "2.23.2",
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/GeoWebCache/geowebcache/issues/1172 | [
"Issue Tracking"
] | github.com | [
"GeoWebCache",
"geowebcache"
] | null | Improve handling special characters in the GWC Seed Form | https://api.github.com/repos/GeoWebCache/geowebcache/issues/1172/comments | 0 | 2023-10-10T16:27:09Z | 2023-11-20T11:20:26Z | https://github.com/GeoWebCache/geowebcache/issues/1172 | 1,935,749,537 | 1,172 | 6,009 |
CVE-2024-23821 | 2024-03-20T18:15:10.407 | GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in th... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcache/issues/1171"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/GeoWebCache/geowebcach... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73E1A204-C95D-4B7B-8C8A-E5639834BB97",
"versionEndExcluding": "2.23.4",
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/GeoWebCache/geowebcache/issues/1171 | [
"Issue Tracking"
] | github.com | [
"GeoWebCache",
"geowebcache"
] | null | Improve handling special characters in the GWC Demos Page | https://api.github.com/repos/GeoWebCache/geowebcache/issues/1171/comments | 0 | 2023-10-10T16:26:17Z | 2023-11-20T11:20:28Z | https://github.com/GeoWebCache/geowebcache/issues/1171 | 1,935,748,316 | 1,171 | 6,010 |
CVE-2024-27935 | 2024-03-21T02:52:22.627 | Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.35.1 and prior to version 1.36.3, a vulnerability in Deno's Node.js compatibility runtime allows for cross-session data contamination during simultaneous asynchronous reads from Node.js streams sourced from sockets or files. The issue aris... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrit... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C495C2E-08BD-43EB-9210-6FF31E09ECCF",
"versionEndExcluding": "1.36.3",
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"488"
] | 488 | https://github.com/denoland/deno/issues/20188 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"denoland",
"deno"
] | ## Issue Description
When testing two pairs of independent server-socket connections using the provided code, an unexpected data cross-reception issue occurs. The setup involves creating two separate servers, each with their corresponding client socket. The servers receive data from their respective sockets and echo t... | "node:net.Socket": Data Cross-Reception Issue Between Independent Server-Socket Pairs | https://api.github.com/repos/denoland/deno/issues/20188/comments | 6 | 2023-08-17T08:30:44Z | 2023-09-08T10:20:35Z | https://github.com/denoland/deno/issues/20188 | 1,854,522,183 | 20,188 | 6,011 |
CVE-2024-2754 | 2024-03-21T07:15:47.193 | A vulnerability classified as critical has been found in SourceCodester Complete E-Commerce Site 1.0. Affected is an unknown function of the file /admin/users_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wkeyi0x1/vul-report/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.257544"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:donbermoy:complete_e-commerce_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "511AE27B-E018-462D-83A9-DFF550393621",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"434"
] | 434 | https://github.com/wkeyi0x1/vul-report/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wkeyi0x1",
"vul-report"
] | # Complete E-Commerce Site in PHP/MySQLi - Arbitrary file vulnerability uploading leads to command execution
+ Author: Shuning Yue
# Vendor Homepage
+ https://www.sourcecodester.com/php/14234/complete-e-commerce-site-phpmysqli.html
# Software Link
+ https://www.sourcecodester.com/download-code?nid=14234&title=Comp... | Complete E-Commerce Site in PHP/MySQLi - Arbitrary file vulnerability uploading leads to command execution | https://api.github.com/repos/wkeyi0x1/vul-report/issues/4/comments | 0 | 2024-03-20T19:15:42Z | 2024-03-20T19:15:42Z | https://github.com/wkeyi0x1/vul-report/issues/4 | 2,198,365,705 | 4 | 6,012 |
CVE-2024-2849 | 2024-03-23T18:15:07.770 | A vulnerability classified as critical was found in SourceCodester Simple File Manager 1.0. This vulnerability affects unknown code. The manipulation of the argument photo leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257770 is the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.257770"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ganeshrkt:simple_file_manager_web_app:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3077F229-94E7-49B4-9E8E-A44CB9702353",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution
+ Author: FanYZ
# Vendor Homepage
+ https://www.sourcecodester.com/upload-download-and-delete-file-using-php-mysql.html
# Software Link
+ https://www.sourcecodester.com/si... | Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution | https://api.github.com/repos/CveSecLook/cve/issues/1/comments | 0 | 2024-03-22T14:51:45Z | 2024-03-22T14:51:45Z | https://github.com/CveSecLook/cve/issues/1 | 2,202,684,616 | 1 | 6,013 |
CVE-2024-2932 | 2024-03-27T01:15:46.830 | A vulnerability classified as critical has been found in SourceCodester Online Chatting System 1.0. Affected is an unknown function of the file admin/update_room.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.258012"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:donbermoy:online_chatting_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85923067-902A-42B7-BB5E-4C6ACE3990C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability
+ Author: WangPeng CUMT
# Vendor Homepage
+ https://www.sourcecodester.com/php/14224/online-chatting-system-using-phpmysql.html
# Software Link
+ https://www.sourcecodester.com/download-code?nid=14224&title=Online+Chatting+Syste... | Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/3/comments | 0 | 2024-03-25T20:14:01Z | 2024-03-25T20:14:01Z | https://github.com/CveSecLook/cve/issues/3 | 2,206,616,626 | 3 | 6,014 |
CVE-2024-31506 | 2024-04-09T18:15:10.467 | Sourcecodester Online Graduate Tracer System v1.0 is vulnerable to SQL Injection via the "id" parameter in admin/admin_cs.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability
+ Author: zhang guixiang
# Vendor Homepage
+ https://www.sourcecodester.com/php/15904/online-graduate-tracer-system-college-ict... | Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/4/comments | 0 | 2024-03-27T16:28:13Z | 2024-03-28T16:31:03Z | https://github.com/CveSecLook/cve/issues/4 | 2,211,250,054 | 4 | 6,015 |
CVE-2024-30916 | 2024-04-11T06:15:07.030 | An issue was discovered in eProsima FastDDS v.2.14.0 and before, allows a local attacker to cause a denial of service (DoS) and obtain sensitive information via a crafted max_samples parameter in DurabilityService QoS component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/eProsima/Fast-DDS/issues/4609"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ePros... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73596FAC-A0D1-4AC6-BB80-C9459B1EA433",
"versionEndExcluding": null,
"versionEndIncluding": "2.14.0",
"versionStartExcl... | [
"20"
] | 20 | https://github.com/eProsima/Fast-DDS/issues/4609 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"eProsima",
"Fast-DDS"
] | ### Is there an already existing issue for this?
- [X] I have searched the existing issues
### Expected behavior
When setting history_depth = 0 or max_samples = 0 in DurabilityService QoS, return bad parameter or inform inconsistent QoS.
### Current behavior
Despite inconsistent QoS settings, datareader,... | Allow inconsistent about DurabilityService QoS | https://api.github.com/repos/eProsima/Fast-DDS/issues/4609/comments | 1 | 2024-03-22T20:41:06Z | 2024-04-05T20:09:51Z | https://github.com/eProsima/Fast-DDS/issues/4609 | 2,203,278,979 | 4,609 | 6,016 |
CVE-2024-3948 | 2024-04-18T11:15:39.300 | A vulnerability was found in SourceCodester Home Clean Service System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file \admin\student.add.php of the component Photo Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xuanluansec/vul/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:library_system_project:library_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD9DDE89-9456-4FAB-B277-1F80D6D9EDBC",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/xuanluansec/vul/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xuanluansec",
"vul"
] | # SourceCodester Home Clean Service System in PHP Free Source Code 1.0 student_add.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Library System using PHP/MySQli with Source Code
## Vendor Homepage
+ https://www.sourcecodester.com/php/12275/library-system-using-php.html
# AFFECTED AND/OR FIXED VERSION(S)
... | SourceCodester Home Clean Service System in PHP Free Source Code 1.0 student_add.php Unrestricted Upload | https://api.github.com/repos/xuanluansec/vul/issues/5/comments | 0 | 2024-04-17T17:10:01Z | 2024-04-17T17:10:01Z | https://github.com/xuanluansec/vul/issues/5 | 2,248,786,611 | 5 | 6,017 |
CVE-2024-32648 | 2024-04-25T18:15:09.157 | Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to version 0.3.0, default functions don't respect nonreentrancy keys and the lock isn't emitted. No vulnerable production contracts were found. Additionally, using a lock on a `default` function is a very sparsely used pattern. As such,... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/vyp... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*",
"matchCriteriaId": "65F778D8-E42E-4CDB-BF02-9406D65FD6B6",
"versionEndExcluding": "0.3.0",
"versionEndIncluding": null,
"versionStartEx... | [
"667"
] | 667 | https://github.com/vyperlang/vyper/issues/2455 | [
"Issue Tracking"
] | github.com | [
"vyperlang",
"vyper"
] | ### Version Information
* vyper Version (output of `vyper --version`): v0.2.16
nonreentrant keys are allowed on default functions, e.g.
```python
@external
@payable
@nonreentrant("default")
def __default__():
pass
```
but it doesn't do anything, here's the output:
```
[seq,
[if, [lt... | default functions don't respect nonreentrancy keys | https://api.github.com/repos/vyperlang/vyper/issues/2455/comments | 1 | 2021-09-10T02:33:40Z | 2021-10-04T20:14:05Z | https://github.com/vyperlang/vyper/issues/2455 | 992,830,789 | 2,455 | 6,018 |
CVE-2024-4809 | 2024-05-14T15:44:59.720 | A vulnerability has been found in SourceCodester Open Source Clinic Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file setting.php. The manipulation of the argument logo leads to unrestricted upload. The attack can be launched remotely. The exploit h... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/26"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.263929"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902",
"versionEndExcluding": null,
"versionEndIncluding": nu... | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/26 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Open Source Clinic Management System in PHP with Full Source Code
## Vendor Homepage
+ https://www.sourcecodester.com/php/14243/open-source-clinic-management-system-... | SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/26/comments | 0 | 2024-05-10T15:41:06Z | 2024-05-10T15:41:07Z | https://github.com/CveSecLook/cve/issues/26 | 2,289,966,823 | 26 | 6,019 |
CVE-2024-4920 | 2024-05-16T00:15:08.563 | A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file registerH.php. The manipulation of the argument ima leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/27"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264455"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/27 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Site
## Vendor Homepage
+ https://www.sourcecodester.com/php/14234/complete-e-commerce-site-phpmysqli.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Cece Chen from W... | SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/27/comments | 0 | 2024-05-13T16:22:30Z | 2024-05-13T16:22:30Z | https://github.com/CveSecLook/cve/issues/27 | 2,293,275,185 | 27 | 6,021 |
CVE-2024-4923 | 2024-05-16T02:15:07.900 | A vulnerability has been found in Codezips E-Commerce Site 1.0 and classified as critical. This vulnerability affects unknown code of the file admin/addproduct.php. The manipulation of the argument profilepic leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the publi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/polaris0x1/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264460"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"434"
] | 434 | https://github.com/polaris0x1/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"polaris0x1",
"CVE"
] | # Codezips E-commerce Site Using PHP With Source Code 1.0 admin/addproduct.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ E-commerce Site Using PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/e-commerce-site-using-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+... | Codezips E-commerce Site Using PHP With Source Code 1.0 admin/addproduct.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/1/comments | 0 | 2024-05-14T11:37:04Z | 2024-05-14T11:37:04Z | https://github.com/ppp-src/CVE/issues/1 | 2,295,192,061 | 1 | 6,022 |
CVE-2024-4945 | 2024-05-16T05:15:52.187 | A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file view_parcel.php. The manipulation of the argument id leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclos... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/28"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264480"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0B90AE-6DFA-40B1-A97C-B445F29F3EB3",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/28 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Best courier management system project in php
## Vendor Homepage
+ https://www.sourcecodester.com/php/16848/best-courier-management-system-project-php.html#google_vignette
... | SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/28/comments | 0 | 2024-05-14T14:55:17Z | 2024-05-15T02:18:44Z | https://github.com/CveSecLook/cve/issues/28 | 2,295,712,099 | 28 | 6,023 |
CVE-2024-4946 | 2024-05-16T06:15:13.547 | A vulnerability was found in SourceCodester Online Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/adminHome.php. The manipulation of the argument sliderpic leads to unrestricted upload. The attack can be launched remotely... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/29"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264481"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:donbermoy:online_art_gallery_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB5104A2-50A5-41E1-8D7F-812A138D0D06",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/29 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Art Gallery Management System Project using PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14211/online-art-gallery-management-system-pr... | SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/29/comments | 0 | 2024-05-14T15:41:58Z | 2024-05-14T15:41:59Z | https://github.com/CveSecLook/cve/issues/29 | 2,295,816,357 | 29 | 6,024 |
CVE-2024-4966 | 2024-05-16T08:15:39.317 | A vulnerability was found in SourceCodester SchoolWebTech 1.0. It has been classified as critical. Affected is an unknown function of the file /improve/home.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the publi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/30"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264534"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sinamjackson:schoolwebtech:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9F74E9-7B76-4ABC-8E25-9525AC85DB93",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/30 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ SchoolWebTech
## Vendor Homepage
+ https://www.sourcecodester.com/php/6638/school-web-tech.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ zebra11
## Vulnerable File
+ /improve/home.php
## VERSION(S... | SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/30/comments | 0 | 2024-05-14T15:45:21Z | 2024-05-14T15:45:21Z | https://github.com/CveSecLook/cve/issues/30 | 2,295,823,794 | 30 | 6,025 |
CVE-2024-34905 | 2024-05-16T15:15:47.887 | FlyFish v3.0.0 was discovered to contain a buffer overflow via the password parameter on the login page. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CloudWise-OpenSource/FlyFish/issues/191"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cloudwise:flyfish:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E15E56-7CF6-466D-83E9-E41842D6780E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"120"
] | 120 | https://github.com/CloudWise-OpenSource/FlyFish/issues/191 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CloudWise-OpenSource",
"FlyFish"
] | **1. testing environment**
The testing environment is VMware Workstation: Seed Ubuntu 20.04
**The version is as follows:**

**2. The vulnerability involves program code location and version number**
**Vulne... | Flyfish has a DDoS vulnerability | https://api.github.com/repos/CloudWise-OpenSource/FlyFish/issues/191/comments | 0 | 2024-05-04T06:26:39Z | 2024-05-04T06:26:39Z | https://github.com/CloudWise-OpenSource/FlyFish/issues/191 | 2,278,785,038 | 191 | 6,026 |
CVE-2024-5046 | 2024-05-17T13:15:59.540 | A vulnerability was found in SourceCodester Online Examination System 1.0. It has been rated as critical. This issue affects some unknown processing of the file registeracc.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/32"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264743"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:online_examination_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1AD6E663-A1BA-4328-BEBF-73C8D20DEA66",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/32 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Online Examination System Project
## Vendor Homepage
+ https://www.sourcecodester.com/php/14351/online-examination-system-project.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
... | SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/32/comments | 0 | 2024-05-15T16:50:17Z | 2024-05-15T16:50:17Z | https://github.com/CveSecLook/cve/issues/32 | 2,298,393,646 | 32 | 6,027 |
CVE-2024-5049 | 2024-05-17T14:15:22.407 | A vulnerability, which was classified as critical, has been found in Codezips E-Commerce Site 1.0. Affected by this issue is some unknown functionality of the file admin/editproduct.php. The manipulation of the argument profilepic leads to unrestricted upload. The attack may be launched remotely. The exploit has been d... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/polaris0x1/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.264746"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"434"
] | 434 | https://github.com/polaris0x1/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"polaris0x1",
"CVE"
] | # Codezips E-commerce Site Using PHP With Source Code 1.0 admin/editproduct.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ E-commerce Site Using PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/e-commerce-site-using-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
... | Codezips E-commerce Site Using PHP With Source Code 1.0 admin/editproduct.php Unrestricted Upload | https://api.github.com/repos/ppp-src/CVE/issues/2/comments | 0 | 2024-05-16T03:14:10Z | 2024-05-16T03:14:10Z | https://github.com/ppp-src/CVE/issues/2 | 2,299,242,580 | 2 | 6,028 |
CVE-2024-5116 | 2024-05-20T04:15:09.070 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Examination System 1.0. Affected by this issue is some unknown functionality of the file save.php. The manipulation of the argument vote leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/polaris0x1/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.265196"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:online_examination_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1AD6E663-A1BA-4328-BEBF-73C8D20DEA66",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/polaris0x1/CVE/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"polaris0x1",
"CVE"
] | # SourceCodester Online Polling System 1.0 save.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Online Examination System Project
## Vendor Homepage
+ https://www.sourcecodester.com/php/14351/online-examination-system-project.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ polaris0x1
## V... | SourceCodester Online Polling System 1.0 save.php SQL injection vulnerability | https://api.github.com/repos/ppp-src/CVE/issues/3/comments | 0 | 2024-05-18T17:22:07Z | 2024-05-18T17:22:07Z | https://github.com/ppp-src/CVE/issues/3 | 2,304,175,120 | 3 | 6,029 |
CVE-2024-5145 | 2024-05-20T23:15:08.533 | A vulnerability was found in SourceCodester Vehicle Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file /newdriver.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated re... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/38"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.265289"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/38 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System in PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/38/comments | 0 | 2024-05-20T11:32:27Z | 2024-05-20T11:32:28Z | https://github.com/CveSecLook/cve/issues/38 | 2,305,786,142 | 38 | 6,030 |
CVE-2024-5362 | 2024-05-26T12:15:08.023 | A vulnerability classified as critical has been found in SourceCodester Online Hospital Management System 1.0. Affected is an unknown function of the file departmentDoctor.php. The manipulation of the argument deptid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/41"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266274"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:online_hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7AE707F-ECBF-4435-B06E-4E87FA07FC29",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/41 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Online Hospital Management System Using PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14386/online-hospital-management-system-using-phpmysql.ht... | SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/41/comments | 0 | 2024-05-23T12:08:12Z | 2024-05-23T12:08:12Z | https://github.com/CveSecLook/cve/issues/41 | 2,312,753,429 | 41 | 6,031 |
CVE-2024-5377 | 2024-05-26T21:15:08.673 | A vulnerability was found in SourceCodester Vehicle Management System 1.0. It has been classified as critical. This affects an unknown part of the file /newvehicle.php. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yuyuliq/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266289"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/yuyuliq/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yuyuliq",
"cve"
] | # SourceCodester Vehicle Management System in PHP/MySQL 1.0 newvehicle.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System in PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitte... | SourceCodester Vehicle Management System in PHP/MySQL 1.0 newvehicle.php Unrestricted Upload | https://api.github.com/repos/yuyuliq/cve/issues/1/comments | 0 | 2024-05-24T06:57:55Z | 2024-05-24T06:57:55Z | https://github.com/yuyuliq/cve/issues/1 | 2,314,575,961 | 1 | 6,032 |
CVE-2024-5381 | 2024-05-26T23:15:22.150 | A vulnerability classified as critical was found in itsourcecode Student Information Management System 1.0. Affected by this vulnerability is an unknown functionality of the file view.php. The manipulation of the argument studentId leads to sql injection. The attack can be launched remotely. The exploit has been disclo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.2662... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:student_information_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC83737B-EB58-46E4-B676-6F2B29894828",
"versionEndExcluding": null,
"versionEndIncluding": null... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Information Management System in PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/st-columban-student-information-management-system
# AFFECTED AND/OR FIXED VERSI... | Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/2/comments | 0 | 2024-05-25T08:52:02Z | 2024-05-25T08:52:02Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/2 | 2,316,847,327 | 2 | 6,033 |
CVE-2024-5390 | 2024-05-27T01:15:20.410 | A vulnerability, which was classified as critical, was found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file listofstudent.php. The manipulation of the argument lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.2663... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S... | Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/3/comments | 0 | 2024-05-26T03:19:39Z | 2024-05-26T03:19:40Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/3 | 2,317,412,593 | 3 | 6,034 |
CVE-2024-5391 | 2024-05-27T01:15:20.693 | A vulnerability has been found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file listofsubject.php. The manipulation of the argument subjcode leads to sql injection. The attack can be launched remotely. The exploit has... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.2663... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S... | Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/4/comments | 0 | 2024-05-26T03:31:54Z | 2024-05-26T05:03:24Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/4 | 2,317,416,662 | 4 | 6,035 |
CVE-2024-5392 | 2024-05-27T02:15:08.933 | A vulnerability was found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file editSubject.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.2663... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
... | Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/5/comments | 0 | 2024-05-26T03:42:45Z | 2024-05-26T03:42:45Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/5 | 2,317,418,785 | 5 | 6,036 |
CVE-2024-5393 | 2024-05-27T02:15:09.240 | A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been classified as critical. This affects an unknown part of the file listofcourse.php. The manipulation of the argument idno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.2663... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)... | Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/6/comments | 0 | 2024-05-26T03:55:14Z | 2024-05-26T03:55:14Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/6 | 2,317,425,493 | 6 | 6,037 |
CVE-2024-5394 | 2024-05-27T02:15:09.530 | A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file newDept.php. The manipulation of the argument deptname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.2663... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
## ... | Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/7/comments | 0 | 2024-05-26T04:13:15Z | 2024-05-26T04:14:08Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/7 | 2,317,452,360 | 7 | 6,038 |
CVE-2024-5395 | 2024-05-27T03:15:08.370 | A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file listofinstructor.php. The manipulation of the argument FullName leads to sql injection. The attack may be initiated remotely. The exploit has been disclos... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.2663... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSIO... | Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/8/comments | 0 | 2024-05-26T04:42:31Z | 2024-05-26T04:42:32Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/8 | 2,317,479,011 | 8 | 6,039 |
CVE-2024-5396 | 2024-05-27T03:15:08.650 | A vulnerability classified as critical has been found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file newfaculty.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/9"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.2663... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/9 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERSION(S)
... | Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/9/comments | 0 | 2024-05-26T04:49:51Z | 2024-05-26T04:49:51Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/9 | 2,317,480,857 | 9 | 6,040 |
CVE-2024-5397 | 2024-05-27T03:15:08.923 | A vulnerability classified as critical was found in itsourcecode Online Student Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file instructorSubjects.php. The manipulation of the argument instructorId leads to sql injection. The attack can be launched remotely. The exploit has... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/10"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Student Enrollment System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/
# AFFECTED AND/OR FIXED VERS... | Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/10/comments | 0 | 2024-05-26T04:59:07Z | 2024-05-26T04:59:07Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/10 | 2,317,483,336 | 10 | 6,041 |
CVE-2024-5515 | 2024-05-30T13:15:50.247 | A vulnerability was found in SourceCodester Stock Management System 1.0. It has been classified as critical. Affected is an unknown function of the file createBrand.php. The manipulation of the argument brandName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/HaojianWang/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266586"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F75A0CB-D496-4651-8633-972D8FA69746",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/HaojianWang/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"HaojianWang",
"cve"
] | # SourceCodester Stock Management System in PHP 1.0 createBrand.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Stock Management System in PHP
## Vendor Homepage
+ https://www.sourcecodester.com/php/14366/stock-management-system-php.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Wang Haoj... | SourceCodester Stock Management System in PHP 1.0 createBrand.php SQL injection vulnerability | https://api.github.com/repos/HaojianWang/cve/issues/1/comments | 0 | 2024-05-28T04:56:11Z | 2024-05-28T04:56:11Z | https://github.com/HaojianWang/cve/issues/1 | 2,320,120,757 | 1 | 6,042 |
CVE-2024-5516 | 2024-05-30T14:15:09.277 | A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file massage.php. The manipulation of the argument bid leads to sql injection. The attack can be launched remotely. The exploit has been ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266587"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Blood Bank Management System in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/... | Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/3/comments | 0 | 2024-05-29T02:22:54Z | 2024-05-29T02:22:54Z | https://github.com/ppp-src/ha/issues/3 | 2,322,218,913 | 3 | 6,043 |
CVE-2024-5517 | 2024-05-30T15:15:50.120 | A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file changepwd.php. The manipulation of the argument useremail leads to sql injection. The attack may be launched remotely. The exploit has been d... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/ha/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266588"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Blood Bank Management System in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-cod... | “Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection | https://api.github.com/repos/ppp-src/ha/issues/4/comments | 0 | 2024-05-29T02:27:59Z | 2024-05-29T02:27:59Z | https://github.com/ppp-src/ha/issues/4 | 2,322,222,992 | 4 | 6,044 |
CVE-2024-5518 | 2024-05-30T16:15:19.327 | A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown part of the file change_profile_picture.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/L1OudFd8cl09/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266589"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/L1OudFd8cl09/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"L1OudFd8cl09",
"CVE"
] | # Itsourcecode Online Discussion Forum Project in PHP with Source Code v1.0 change_profile_picture.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-... | Itsourcecode Online Discussion Forum Project in PHP with Source Code v1.0 change_profile_picture.php Unrestricted Upload | https://api.github.com/repos/L1OudFd8cl09/CVE/issues/1/comments | 0 | 2024-06-03T01:08:35Z | 2024-06-03T01:27:33Z | https://github.com/L1OudFd8cl09/CVE/issues/1 | 2,329,970,193 | 1 | 6,045 |
CVE-2024-5519 | 2024-05-30T16:15:19.613 | A vulnerability classified as critical was found in ItsourceCode Learning Management System Project In PHP 1.0. This vulnerability affects unknown code of the file login.php. The manipulation of the argument user_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/L1OudFd8cl09/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266590"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/L1OudFd8cl09/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"L1OudFd8cl09",
"CVE"
] | # Itsourcecode Learning Management System Project In PHP With Source Code v1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Learning Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-sou... | Itsourcecode Learning Management System Project In PHP With Source Code v1.0 login.php SQL injection | https://api.github.com/repos/L1OudFd8cl09/CVE/issues/2/comments | 0 | 2024-06-03T01:09:10Z | 2024-06-03T01:22:04Z | https://github.com/L1OudFd8cl09/CVE/issues/2 | 2,329,970,652 | 2 | 6,046 |
CVE-2024-5588 | 2024-06-02T15:15:08.230 | A vulnerability was found in itsourcecode Learning Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file processscore.php. The manipulation of the argument LessonID leads to sql injection. The attack can be launched remotely. The exploit has been... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/12"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.266... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Learning Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-w... | Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/12/comments | 0 | 2024-05-31T04:03:32Z | 2024-05-31T04:03:32Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/12 | 2,326,918,435 | 12 | 6,047 |
CVE-2024-36675 | 2024-06-04T22:15:10.740 | LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/LyLme/lylme_spage/issues/92"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/LyLme/l... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5D86CA-58F2-4545-9D9D-0BA9967C9506",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"918"
] | 918 | https://github.com/LyLme/lylme_spage/issues/92 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"LyLme",
"lylme_spage"
] | # Summary
An SSRF (Server-Side Request Forgery) vulnerability was identified in the LyLme_spage version 1.9.5. This vulnerability allows internal network requests to be initiated and sensitive information to be retrieved by accessing a specific URL.
# Details
The vulnerability resides in the get_head function which ... | SSRF Vulnerability in LyLme_spage v1.9.5 | https://api.github.com/repos/LyLme/lylme_spage/issues/92/comments | 1 | 2024-05-22T05:41:55Z | 2025-01-29T03:29:05Z | https://github.com/LyLme/lylme_spage/issues/92 | 2,309,618,181 | 92 | 6,048 |
CVE-2024-36779 | 2024-06-06T13:15:31.590 | Sourcecodester Stock Management System v1.0 is vulnerable to SQL Injection via editCategories.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/42"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stock_management_system_project:stock_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F48DAD43-EB1C-4267-B97D-63BBFF86C70F",
"versionEndExcluding": null,
"versionEndIncluding":... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/42 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Stock Management System in PHP
## Vendor Homepage
+ https://www.sourcecodester.com/php/14366/stock-management-system-php.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xiao h... | SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/42/comments | 0 | 2024-05-24T00:25:31Z | 2024-05-24T04:30:13Z | https://github.com/CveSecLook/cve/issues/42 | 2,314,064,021 | 42 | 6,049 |
CVE-2024-22524 | 2024-06-06T22:15:10.043 | dnspod-sr 0dfbd37 is vulnerable to buffer overflow. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/DNSPod/dnspod-sr/issues/60"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/DNSPod/d... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*",
"matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"476"
] | 476 | https://github.com/DNSPod/dnspod-sr/issues/60 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"DNSPod",
"dnspod-sr"
] | in
https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/src/init.c#L186
if `s->logpath` is not set,
https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/src/io.c#L461
will use memcpy with a null pointer and will cause
<img width="531" alt="image" src="ht... | global buffer overflow | https://api.github.com/repos/DNSPod/dnspod-sr/issues/60/comments | 0 | 2023-12-27T03:45:53Z | 2023-12-27T03:45:53Z | https://github.com/DNSPod/dnspod-sr/issues/60 | 2,056,877,351 | 60 | 6,050 |
CVE-2024-22525 | 2024-06-06T22:15:10.127 | dnspod-sr 0dfbd37 contains a SEGV. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/DNSPod/dnspod-sr/issues/61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/DNSPod/d... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*",
"matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"476"
] | 476 | https://github.com/DNSPod/dnspod-sr/issues/61 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"DNSPod",
"dnspod-sr"
] | in
https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/tool/client.c#L81
if given a null argv[1], a segv will be triggered by memcpy
<img width="1116" alt="image" src="https://github.com/DNSPod/dnspod-sr/assets/66028849/82288557-16a5-49ce-8594-ceca5a85850a">
| SEGV on client | https://api.github.com/repos/DNSPod/dnspod-sr/issues/61/comments | 0 | 2023-12-27T04:02:23Z | 2023-12-27T04:02:23Z | https://github.com/DNSPod/dnspod-sr/issues/61 | 2,056,885,098 | 61 | 6,051 |
CVE-2024-24192 | 2024-06-06T22:15:10.213 | robdns commit d76d2e6 was discovered to contain a heap overflow via the component block->filename at /src/zonefile-insertion.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/robertdavidgraham/robdns/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/robertdavidgraham/robdns/issues/8"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:robertdavidgraham:robdns:2015-12-09:*:*:*:*:*:*:*",
"matchCriteriaId": "468F3841-3FFD-4B95-A5AB-5BE25DB6066D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"125"
] | 125 | https://github.com/robertdavidgraham/robdns/issues/8 | [
"Issue Tracking"
] | github.com | [
"robertdavidgraham",
"robdns"
] | in line https://github.com/robertdavidgraham/robdns/blob/d76d2e6817ebefe240c667aecdc478d7e3fec586/src/zonefile-insertion.c#L161
in some case the size of `block->filename` will surpass the size of `parser->src.filename`, which will leak the heap information. This can be detected by ASAN.
<img width="612" alt="ima... | heap buffer overflow | https://api.github.com/repos/robertdavidgraham/robdns/issues/8/comments | 1 | 2024-01-14T14:48:53Z | 2024-10-14T02:09:51Z | https://github.com/robertdavidgraham/robdns/issues/8 | 2,080,758,839 | 8 | 6,052 |
CVE-2024-5733 | 2024-06-07T12:15:09.190 | A vulnerability was found in itsourcecode Online Discussion Forum 1.0. It has been rated as critical. This issue affects some unknown processing of the file register_me.php. The manipulation of the argument eaddress leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kingshao0312/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "753A7DC0-ED1C-4F55-B204-582C4E09467C",
"versionEndExcluding": null,
"versionEndIncluding":... | [
"89"
] | 89 | https://github.com/kingshao0312/cve/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kingshao0312",
"cve"
] | # Itsourcecode Online Discussion Forum Project in PHP with Source Code register_me.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-cod... | Itsourcecode Online Discussion Forum Project in PHP with Source Code register_me.php SQL injection | https://api.github.com/repos/kingshao0312/cve/issues/1/comments | 0 | 2024-06-06T08:54:07Z | 2024-06-06T09:02:09Z | https://github.com/kingshao0312/cve/issues/1 | 2,337,719,740 | 1 | 6,053 |
CVE-2024-5734 | 2024-06-07T12:15:09.463 | A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. Affected is an unknown function of the file /members/poster.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kingshao0312/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "753A7DC0-ED1C-4F55-B204-582C4E09467C",
"versionEndExcluding": null,
"versionEndIncluding":... | [
"434"
] | 434 | https://github.com/kingshao0312/cve/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kingshao0312",
"cve"
] | # Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Discussion Forum Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-co... | Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload | https://api.github.com/repos/kingshao0312/cve/issues/2/comments | 0 | 2024-06-06T08:57:58Z | 2024-06-06T08:57:58Z | https://github.com/kingshao0312/cve/issues/2 | 2,337,730,685 | 2 | 6,054 |
CVE-2024-36673 | 2024-06-07T13:15:49.547 | Sourcecodester Pharmacy/Medical Store Point of Sale System 1.0 is vulnerable SQL Injection via login.php. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/39"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pharmacy\\/medical_store_point_of_sale_system_project:pharmacy\\/medical_store_point_of_sale_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F27B3402-54AA-4DAF-BEF4-E6E6EB9EFEC1",
"versionEndExcludin... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/39 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code
## Vendor Homepage
+ ht... | SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/39/comments | 0 | 2024-05-21T09:26:36Z | 2024-05-21T09:26:36Z | https://github.com/CveSecLook/cve/issues/39 | 2,307,818,147 | 39 | 6,055 |
CVE-2024-36827 | 2024-06-07T19:15:24.017 | An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of ebookmeta before v1.2.8 allows attackers to access sensitive information or cause a Denial of Service (DoS) via crafted XML input. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dnkorpushov:ebookmeta:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA99F79-C8DC-4E7C-9572-13FAF67C04DB",
"versionEndExcluding": "1.2.8",
"versionEndIncluding": null,
"versionStartE... | [
"611"
] | 611 | https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dnkorpushov",
"ebookmeta"
] | I found that when the ebookmeta version is less than 1.2.8 and the lxml version is less than 4.9.1, the ebookmeta.get_metadata function will have an xxe vulnerability. An attacker could use this vulnerability to read sensitive information from the server.
| xxe vulnerability in ebookmeta.get_metadata() | https://api.github.com/repos/dnkorpushov/ebookmeta/issues/16/comments | 0 | 2024-05-26T13:24:04Z | 2024-07-09T14:48:05Z | https://github.com/dnkorpushov/ebookmeta/issues/16 | 2,317,712,335 | 16 | 6,056 |
CVE-2024-5773 | 2024-06-09T03:15:55.633 | A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /protocol/firewall/deletemacbind.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to launch the attack remotely. The e... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/L1OudFd8cl09/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267456"
},
{
"source": "cna@vuldb.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/L1OudFd8cl09/CVE/issues/3 | [
"Exploit"
] | github.com | [
"L1OudFd8cl09",
"CVE"
] | Beijing Wangkang Technology Co., Ltd. is a leading provider of network application management equipment in China, focusing on the latest trend research and analysis in the field of network application management. It provides users with advanced network application management technology, products, and solutions, aiming ... | NS-ASG application security gateway. Attackers exploit vulnerabilities | https://api.github.com/repos/L1OudFd8cl09/CVE/issues/3/comments | 0 | 2024-06-04T01:25:59Z | 2024-06-10T01:56:59Z | https://github.com/L1OudFd8cl09/CVE/issues/3 | 2,332,337,521 | 3 | 6,057 |
CVE-2024-5774 | 2024-06-09T06:15:07.410 | A vulnerability has been found in SourceCodester Stock Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/CveSecLook/cve/issues/43"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267457"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F75A0CB-D496-4651-8633-972D8FA69746",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/43 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability
# NAME OF AFFECTED PRODUCT(S)
+ Stock Management System in PHP
## Vendor Homepage
+ https://www.sourcecodester.com/php/14366/stock-management-system-php.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xuanluansec
##... | SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability | https://api.github.com/repos/CveSecLook/cve/issues/43/comments | 0 | 2024-06-08T04:24:31Z | 2024-06-08T04:24:31Z | https://github.com/CveSecLook/cve/issues/43 | 2,341,450,040 | 43 | 6,058 |
CVE-2024-5775 | 2024-06-09T08:15:23.373 | A vulnerability was found in SourceCodester Vehicle Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file updatebill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the pu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/CveSecLook/cve/issues/44"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.267458"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/44 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System in PHP/MySQL
## Vendor Homepage
+ https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ x... | SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/44/comments | 0 | 2024-06-08T04:29:27Z | 2024-06-08T04:29:27Z | https://github.com/CveSecLook/cve/issues/44 | 2,341,453,168 | 44 | 6,059 |
CVE-2024-37568 | 2024-06-09T19:15:52.323 | lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless an algorithm is specified in a jwt.decode call, HMAC verification is allowed with any asymmetric public key. (This is similar to CVE-2022-29217 and CVE-2024-33663.) | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/lepture/authlib/issues/654"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/mess... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18E429CB-390E-4F80-B36A-83E930FFDC41",
"versionEndExcluding": "1.3.1",
"versionEndIncluding": null,
"versionStartExcludi... | [
"347"
] | 347 | https://github.com/lepture/authlib/issues/654 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"lepture",
"authlib"
] | # Issue description
If the `algorithm` field is left unspecified when calling `jwt.decode`, the library will allow HMAC verification with ANY asymmetric public key. The library does no checks whatsoever to mitigate this. This applies to verification with the algorithms HS256, HS384, and HS512 in lieu of the asymmetr... | Algorithm confusion when verifying JSON Web Tokens with asymmetric public keys | https://api.github.com/repos/authlib/authlib/issues/654/comments | 5 | 2024-06-03T13:51:05Z | 2024-06-10T16:40:33Z | https://github.com/authlib/authlib/issues/654 | 2,331,218,331 | 654 | 6,060 |
CVE-2024-37014 | 2024-06-10T20:15:15.213 | Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/langflow-ai/langflow/issues/1973"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/la... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32795F99-77E1-46F4-ABBF-53A7616F4777",
"versionEndExcluding": null,
"versionEndIncluding": "0.6.19",
"versionStartExcl... | [
"94"
] | 94 | https://github.com/langflow-ai/langflow/issues/1973 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"langflow-ai",
"langflow"
] | **Quick note**
Langflow is a very interesting and useful framework for those who work with AI projects. Personally, it's a cool project to learn from. It seems the Custom Component feature was launched to support user-defined Python scripts that use the Langflow provided library. This is a great feature. However, upon... | [Security Issue] Code Execution against underlying host system in Custom Component | https://api.github.com/repos/langflow-ai/langflow/issues/1973/comments | 8 | 2024-05-25T15:48:20Z | 2024-08-02T19:56:39Z | https://github.com/langflow-ai/langflow/issues/1973 | 2,317,095,064 | 1,973 | 6,061 |
CVE-2024-36761 | 2024-06-12T16:15:11.983 | naga v0.14.0 was discovered to contain a stack overflow via the component /wgsl/parse/mod.rs. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36761/info.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gfx-rs:naga:0.14.0:*:*:*:*:rust:*:*",
"matchCriteriaId": "78CD5E32-2654-480D-99A6-B5B24501BB0D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"787"
] | 787 | https://github.com/gfx-rs/naga/issues/2591 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gfx-rs",
"naga"
] | When I was using oss-fuzz to test the fuzzer wgsl_parser in my project, I found a stack overflow vulnerability that could trigger a crash by typing enough '(' into the fuzzer.
The crash information is as follows:
```
=================================================================
==132416==ERROR: AddressSanitizer... | A stack overflow vulnerability was found | https://api.github.com/repos/gfx-rs/naga/issues/2591/comments | 1 | 2024-05-28T13:48:42Z | 2024-05-31T08:38:21Z | https://github.com/gfx-rs/naga/issues/2591 | 2,321,122,927 | 2,591 | 6,062 |
CVE-2024-5898 | 2024-06-12T17:15:52.577 | A vulnerability was found in itsourcecode Payroll Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file print_payroll.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/guiyxli/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268142... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20FC2EF9-5A2B-4173-8F3B-34B209DA6A10",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/guiyxli/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"guiyxli",
"cve"
] | # Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 print_payroll.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Payroll Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/payroll-system-php/
# AFFECTED AND/OR FIXED... | Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 print_payroll.php SQL injection | https://api.github.com/repos/guiyxli/cve/issues/1/comments | 0 | 2024-06-12T02:46:13Z | 2024-06-12T02:46:13Z | https://github.com/guiyxli/cve/issues/1 | 2,347,680,282 | 1 | 6,063 |
CVE-2024-37629 | 2024-06-12T18:15:12.293 | SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/summernote/summernote/issues/4642"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://grumpz.net/cve-2024-37629-sim... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:summernote:summernote:0.8.18:*:*:*:*:*:*:*",
"matchCriteriaId": "D350F186-13E4-441E-9F5A-93A720A12C74",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"79"
] | 79 | https://github.com/summernote/summernote/issues/4642 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"summernote",
"summernote"
] | ### Checklist
- [X] I've looked at the [documentation](https://summernote.org/deep-dive/) to make sure the behavior isn't documented and expected.
- [X] I'm sure this is an issue with Summernote, not with my app or other dependencies (Angular, Cordova, React, etc.).
- [X] I've searched through the [current issues](htt... | XSS Discovered in The Code View Function - Version 0.8.18+ | https://api.github.com/repos/summernote/summernote/issues/4642/comments | 2 | 2024-05-30T06:28:28Z | 2024-10-01T10:05:54Z | https://github.com/summernote/summernote/issues/4642 | 2,324,814,414 | 4,642 | 6,064 |
CVE-2024-37849 | 2024-06-13T14:15:13.300 | A SQL Injection vulnerability in itsourcecode Billing System 1.0 allows a local attacker to execute arbitrary code in process.php via the username parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ganzhi-qcy/cve/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:billing_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8F33BD-6CFA-4C5D-8E2A-F9E35CE5E818",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"89"
] | 89 | https://github.com/ganzhi-qcy/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ganzhi-qcy",
"cve"
] | # Itsourcecode "Billing System " in PHP 1.0 "process.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Billing System In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | Itsourcecode "Billing System " in PHP 1.0 "process.php" SQL injection | https://api.github.com/repos/ganzhi-qcy/cve/issues/3/comments | 0 | 2024-06-07T12:35:49Z | 2024-10-04T07:38:47Z | https://github.com/ganzhi-qcy/cve/issues/3 | 2,340,350,987 | 3 | 6,065 |
CVE-2024-5981 | 2024-06-14T02:15:09.897 | A vulnerability was found in itsourcecode Online House Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the publi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LiuYongXiang-git/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.268458"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:online_house_rental_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A276F952-0667-44B9-898A-4F0B94154436",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/LiuYongXiang-git/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LiuYongXiang-git",
"cve"
] | # Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online House Rental System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-house-rental-system-project-in-php-w... | Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection | https://api.github.com/repos/LiuYongXiang-git/cve/issues/1/comments | 0 | 2024-06-13T10:40:51Z | 2024-06-13T10:40:51Z | https://github.com/LiuYongXiang-git/cve/issues/1 | 2,350,806,578 | 1 | 6,066 |
CVE-2024-5983 | 2024-06-14T02:15:10.173 | A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bookPerPub.php. The manipulation of the argument pubid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Mitigation"
],
"url": "https://github.com/LiuYongXiang-git/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268459"
},
{
"source": "cna@v... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_book_store_project:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD59DD3-AEC8-4FEB-8580-5501B34821AE",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/LiuYongXiang-git/cve/issues/2 | [
"Exploit",
"Mitigation"
] | github.com | [
"LiuYongXiang-git",
"cve"
] | # Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 bookPerPub.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online-Bookstore-Project-In-PHP-Source-Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/
# AFFECTED AND/OR FIXE... | Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 bookPerPub.php SQL injection | https://api.github.com/repos/LiuYongXiang-git/cve/issues/2/comments | 0 | 2024-06-13T10:44:19Z | 2024-06-13T10:50:21Z | https://github.com/LiuYongXiang-git/cve/issues/2 | 2,350,813,076 | 2 | 6,067 |
CVE-2024-5984 | 2024-06-14T02:15:10.443 | A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file book.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LiuYongXiang-git/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268460"
},
{
"sourc... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_book_store_project:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD59DD3-AEC8-4FEB-8580-5501B34821AE",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/LiuYongXiang-git/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LiuYongXiang-git",
"cve"
] | # Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 book.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online-Bookstore-Project-In-PHP-Source-Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERS... | Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 book.php SQL injection | https://api.github.com/repos/LiuYongXiang-git/cve/issues/3/comments | 0 | 2024-06-13T10:52:17Z | 2024-06-13T10:52:18Z | https://github.com/LiuYongXiang-git/cve/issues/3 | 2,350,828,578 | 3 | 6,068 |
CVE-2024-5985 | 2024-06-14T02:15:10.713 | A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/CveSecLook/cve/issues/45"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268461"
},
{
"source": "cna@vuldb.com",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:best_online_news_portal_project:best_online_news_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83739685-D8B6-4A14-89A7-C1AC4F28260A",
"versionEndExcluding": null,
"versionEndIncluding":... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/45 | [
"Exploit"
] | github.com | [
"CveSecLook",
"cve"
] | # SourceCodester Best online news portal project in php free download /admin/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ CASAP Automated Enrollment System using PHP/MySQLi with Source Code
## Vendor Homepage
+ https://www.sourcecodester.com/php/16067/best-online-news-portal-project-php-free-download.htm... | SourceCodester Best online news portal project in php free download /admin/index.php SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/45/comments | 0 | 2024-06-13T11:20:09Z | 2024-06-13T11:20:09Z | https://github.com/CveSecLook/cve/issues/45 | 2,350,883,829 | 45 | 6,069 |
CVE-2024-37831 | 2024-06-14T20:15:11.777 | Itsourcecode Payroll Management System 1.0 is vulnerable to SQL Injection in payroll_items.php via the ID parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ganzhi-qcy/cve/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ganzhi-qcy/cve/issues/5"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B5AA5E2-02CB-46E7-9DC9-84E4FA6D227A",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ganzhi-qcy/cve/issues/5 | [
"Third Party Advisory"
] | github.com | [
"ganzhi-qcy",
"cve"
] | 1. [CVE ID]
2. CVE-CVE-2024-37831
3. submitter:quchunyi,yaomingjun,luowenwei,zhangxin,chenshan,tianbeibei,fengyilin,maqiutong,fuweidong,lishudong at Guangzhou University
4. [PRODUCT]
5. Itsourcecode
6. [VERSION]
7. V1.0
8. [PROBLEM TYPE]
9. SQL Injection
10. [DESCRIPTION]
11. Itsourcecode Payroll Management S... | CVE-2024-37831 | https://api.github.com/repos/ganzhi-qcy/cve/issues/5/comments | 0 | 2024-06-14T05:55:36Z | 2024-10-04T07:37:20Z | https://github.com/ganzhi-qcy/cve/issues/5 | 2,352,575,813 | 5 | 6,070 |
CVE-2024-6008 | 2024-06-15T15:15:51.033 | A vulnerability, which was classified as critical, was found in itsourcecode Online Book Store up to 1.0. Affected is an unknown function of the file /edit_book.php. The manipulation of the argument image leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/1902zdq/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.26869... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isourcecode:online_book_store_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71AB5A7E-412A-4649-9E8D-465255D0757F",
"versionEndExcluding": null,
"versionEndInclu... | [
"89"
] | 89 | https://github.com/1902zdq/cve/issues/1 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"1902zdq",
"cve"
] | # Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 edit_book.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online-Bookstore-Project-In-PHP-Source-Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/
# AFFECTED AND/OR... | Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 edit_book.php Unrestricted Upload | https://api.github.com/repos/Wumshi/cve/issues/1/comments | 0 | 2024-06-14T06:23:27Z | 2024-06-14T06:23:27Z | https://github.com/Wumshi/cve/issues/1 | 2,352,612,520 | 1 | 6,071 |
CVE-2024-6009 | 2024-06-15T16:15:09.830 | A vulnerability has been found in itsourcecode Event Calendar 1.0 and classified as critical. Affected by this vulnerability is the function regConfirm/regDelete of the file process.php. The manipulation of the argument userId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/AutoZhou1/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.268... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:learning_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4B5F22-F2E1-4DDB-ABEA-61B253FE76F6",
"versionEndExcluding": null,
"versi... | [
"89"
] | 89 | https://github.com/AutoZhou1/cve/issues/1 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"AutoZhou1",
"cve"
] | # Itsourcecode Event Calendar In PHP v2.3 process.php v2.3 SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Event Calendar In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Code... | Itsourcecode Event Calendar In PHP v2.3 process.php v2.3 SQL injection | https://api.github.com/repos/Code-099/cve/issues/1/comments | 0 | 2024-06-14T08:09:04Z | 2024-06-14T08:09:05Z | https://github.com/Code-099/cve/issues/1 | 2,352,801,293 | 1 | 6,072 |
CVE-2024-6013 | 2024-06-15T16:15:10.137 | A vulnerability was found in itsourcecode Online Book Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin_delete.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/gabriel202212/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_book_store_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4DCA80-C02C-4BE9-83EE-294CD8ECFDD1",
"versionEndExcluding": null,
"vers... | [
"89"
] | 89 | https://github.com/gabriel202212/cve/issues/1 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"gabriel202212",
"cve"
] | # Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 admin_delete.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online-Bookstore-Project-In-PHP-Source-Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/
# AFFECTED AND/OR FI... | Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 admin_delete.php SQL injection | https://api.github.com/repos/gabriel202212/cve/issues/1/comments | 0 | 2024-06-14T05:14:26Z | 2024-06-14T05:14:26Z | https://github.com/gabriel202212/cve/issues/1 | 2,352,524,829 | 1 | 6,073 |
CVE-2024-6014 | 2024-06-15T17:15:49.100 | A vulnerability classified as critical has been found in itsourcecode Document Management System 1.0. Affected is an unknown function of the file edithis.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/gabriel202212/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:document_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B896ED3E-BEFB-4226-9F2E-D703C9765BB1",
"versionEndExcluding": null,
"versi... | [
"89"
] | 89 | https://github.com/gabriel202212/cve/issues/2 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"gabriel202212",
"cve"
] | # Itsourcecode Document Management System Open Source PHP v1.0 edithis.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Document Management System Open Source PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/document-management-system-open-source-php/
# AFFECTED AND/OR FIXED VERSION(S)... | Itsourcecode Document Management System Open Source PHP v1.0 edithis.php SQL injection | https://api.github.com/repos/gabriel202212/cve/issues/2/comments | 0 | 2024-06-14T08:21:39Z | 2024-06-14T08:21:39Z | https://github.com/gabriel202212/cve/issues/2 | 2,352,823,423 | 2 | 6,074 |
CVE-2024-6015 | 2024-06-15T17:15:49.403 | A vulnerability classified as critical was found in itsourcecode Online House Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument month_of leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/chenwulin-bit/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:online_house_rental_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83FB0E1D-9D4D-40F5-8326-94970698C31F",
"versionEndExcluding": null,
"versi... | [
"89"
] | 89 | https://github.com/chenwulin-bit/cve/issues/1 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"chenwulin-bit",
"cve"
] | # Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online House Rental System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-house-rental-system-project-in-php-w... | Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection | https://api.github.com/repos/chenwulin-bit/cve/issues/1/comments | 0 | 2024-06-14T14:38:14Z | 2024-06-14T14:38:14Z | https://github.com/chenwulin-bit/cve/issues/1 | 2,353,523,129 | 1 | 6,075 |
CVE-2024-6016 | 2024-06-15T19:15:48.443 | A vulnerability, which was classified as critical, has been found in itsourcecode Online Laundry Management System 1.0. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/chenwulin-bit/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:laundry_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9098A3E9-9903-45B9-8F93-8F55DD9FD767",
"versionEndExcluding": null,
"versio... | [
"89"
] | 89 | https://github.com/chenwulin-bit/cve/issues/2 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"chenwulin-bit",
"cve"
] | # Itsourcecode Laundry Management System Project In PHP v1.0 admin_class.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Laundry Management System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/laundry-management-system-project-in-php-with-source-code/
# AFFECTED AND/OR FI... | Itsourcecode Laundry Management System Project In PHP v1.0 admin_class.php SQL injection | https://api.github.com/repos/chenwulin-bit/cve/issues/2/comments | 0 | 2024-06-14T14:46:54Z | 2024-06-14T14:46:54Z | https://github.com/chenwulin-bit/cve/issues/2 | 2,353,539,007 | 2 | 6,076 |
CVE-2024-38461 | 2024-06-16T16:15:09.537 | irodsServerMonPerf in iRODS before 4.3.2 attempts to proceed with use of a path even if it is not a directory. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/irods/irods/issues/7652"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/irods/irods/releases/tag/4.3.2"
},
{
"source": "cve@mitre.org... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B",
"versionEndExcluding": "4.3.2",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"754"
] | 754 | https://github.com/irods/irods/issues/7652 | [
"Issue Tracking"
] | github.com | [
"irods",
"irods"
] | - [x] main
- [x] 4-3-stable | irodsServerMonPerf doesn't check for bad paths | https://api.github.com/repos/irods/irods/issues/7652/comments | 0 | 2024-04-09T16:54:32Z | 2024-04-09T17:39:54Z | https://github.com/irods/irods/issues/7652 | 2,233,889,252 | 7,652 | 6,077 |
CVE-2024-38462 | 2024-06-16T16:15:09.627 | iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/irods/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B",
"versionEndExcluding": "4.3.2",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"426"
] | 426 | https://github.com/irods/irods/issues/7562 | [
"Issue Tracking"
] | github.com | [
"irods",
"irods"
] | - [x] main
- [x] 4-3-stable
---
## Deprecation
`msiSendMail` provides very basic functionality for sending email. iRODS exposes mechanisms for building much better email-related tools (e.g. `msiExecCmd` and Python).
This microservice also adds an unnecessary dependency on the `mail` binary.
With that said, ... | Deprecate `msiSendMail` | https://api.github.com/repos/irods/irods/issues/7562/comments | 0 | 2024-03-14T15:54:03Z | 2024-03-18T16:22:03Z | https://github.com/irods/irods/issues/7562 | 2,186,719,768 | 7,562 | 6,078 |
CVE-2024-38462 | 2024-06-16T16:15:09.627 | iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/irods/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B",
"versionEndExcluding": "4.3.2",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"426"
] | 426 | https://github.com/irods/irods/issues/7651 | [
"Issue Tracking",
"Patch"
] | github.com | [
"irods",
"irods"
] | - [x] 4-3-stable
- [x] irods/irods_docs
## Deprecation
- Add private variable for controlling whether `msiSendMail` returns early
- Add new MSI for changing the value of the variable
- Requires rodsadmin privileges
- Potential names for the MSI
- `msi_use_deprecated_msiSendMail`
- `ms... | Make `msiSendMail` opt-in | https://api.github.com/repos/irods/irods/issues/7651/comments | 1 | 2024-04-09T16:45:59Z | 2024-04-11T19:08:52Z | https://github.com/irods/irods/issues/7651 | 2,233,875,219 | 7,651 | 6,079 |
CVE-2024-6041 | 2024-06-16T23:15:49.417 | A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ssiicckk/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.268765"
},
{
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:admerc:gym_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "959641DE-44CC-4870-AEDF-5E73A4BC5687",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | [
"89"
] | 89 | https://github.com/ssiicckk/cve/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ssiicckk",
"cve"
] | # Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_user.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Gym Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/gym-management-system-project-in-php-with-source-code/... | Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_user.php SQL injection | https://api.github.com/repos/ssiicckk/cve/issues/1/comments | 0 | 2024-06-15T08:19:54Z | 2024-06-15T08:19:54Z | https://github.com/ssiicckk/cve/issues/1 | 2,354,643,688 | 1 | 6,080 |
CVE-2024-6042 | 2024-06-17T00:15:09.323 | A vulnerability was found in itsourcecode Real Estate Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file property-detail.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Cormac315/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:real_estate_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89CC775B-6E0F-474F-AE02-7D933814C0ED",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Cormac315/cve/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Cormac315",
"cve"
] | # Itsourcecode Real Estate Management System Project In PHP v1.0 property-detail.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Real Estate Management System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/real-estate-management-system-project-in-php-free-download/
# AFFE... | Itsourcecode Real Estate Management System Project In PHP v1.0 property-detail.php SQL injection | https://api.github.com/repos/Cormac315/cve/issues/1/comments | 0 | 2024-06-15T11:23:56Z | 2024-06-15T11:23:57Z | https://github.com/Cormac315/cve/issues/1 | 2,354,765,014 | 1 | 6,081 |
CVE-2024-37619 | 2024-06-17T14:15:10.943 | StrongShop v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the spec_group_id parameter at /spec/index.blade.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/Hebing123/cve/issues/45"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.strongshop.cn/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:strongshop:strongshop:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C00D0882-D77C-4C00-BC4C-D0F94A2649D8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/45 | [
"Exploit"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
StrongShop v1.0 has a Reflective Cross-Site Scripting (XSS) vulnerability located in the file `resources/views/admin/product/spec/index.blade.php`.
# Details
The vulnerability is located in the script tag. The application does not escape the user-supplied `spec_group_id` parameter before including it in th... | StrongShop v1.0 has a reflected XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/45/comments | 1 | 2024-05-30T02:50:20Z | 2024-06-21T02:34:30Z | https://github.com/Hebing123/cve/issues/45 | 2,324,586,619 | 45 | 6,082 |
CVE-2024-37624 | 2024-06-17T14:15:11.680 | Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /chajian/inputChajian.php. component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://github.com/rainrocka/xinhu/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockoa:xinhu:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D6357A91-F746-425E-91F6-6AEFD6F1C66C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/rainrocka/xinhu/issues/6 | [
"Exploit",
"Technical Description"
] | github.com | [
"rainrocka",
"xinhu"
] | # Summary
A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Xinhu RockOA v2.6.3.
# Details
The XSS vulnerability originates from `/include/chajian/inputChajian.php`:
https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/include/chajian/inputChajian.php#L100
... | Reflected XSS Vulnerability in Xinhu RockOA v2.6.3 | https://api.github.com/repos/rainrocka/xinhu/issues/6/comments | 0 | 2024-05-31T07:18:27Z | 2024-05-31T07:43:01Z | https://github.com/rainrocka/xinhu/issues/6 | 2,327,130,572 | 6 | 6,083 |
CVE-2024-37625 | 2024-06-17T14:15:11.790 | zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /index.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/zhimengzhe/iBarn"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://github.com/zhimengzhe/iBarn/issues/20"
},
{
"source": "af854a... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zhimengzhel:ibarn:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B3DA9D8B-BD04-47E5-8D46-78B2F6EBC874",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/zhimengzhe/iBarn/issues/20 | [
"Exploit",
"Technical Description"
] | github.com | [
"zhimengzhe",
"iBarn"
] | # Summary
A reflected Cross Site Scripting (XSS) vulnerability exists in iBarn v1.5 due to improper sanitization of the `$search` parameter in the `html/index.php`, `html/pay.php`, and `html/own.php` files. Although the `htmlspecialchars` function is used to encode HTML entities, the developers utilized the flag `ENT_... | iBarn v1.5 has a reflected XSS vulnerability | https://api.github.com/repos/zhimengzhe/iBarn/issues/20/comments | 0 | 2024-06-03T10:35:48Z | 2024-06-03T10:35:48Z | https://github.com/zhimengzhe/iBarn/issues/20 | 2,330,789,142 | 20 | 6,084 |
CVE-2024-6061 | 2024-06-17T20:15:14.850 | A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/287... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"835"
] | 835 | https://github.com/gpac/gpac/issues/2871 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | ## version
```shell
./MP4Box -version
MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master
(c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: http... | Infinite loop in MP4Box | https://api.github.com/repos/gpac/gpac/issues/2871/comments | 0 | 2024-06-12T08:30:30Z | 2024-06-12T13:25:17Z | https://github.com/gpac/gpac/issues/2871 | 2,348,153,606 | 2,871 | 6,085 |
CVE-2024-6062 | 2024-06-17T20:15:15.170 | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/287... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/2872 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | ## version
```shell
./MP4Box -version
MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master
(c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: http... | Null pointer deference in filters/load_text.c:2534 | https://api.github.com/repos/gpac/gpac/issues/2872/comments | 0 | 2024-06-12T08:31:34Z | 2024-06-12T13:31:34Z | https://github.com/gpac/gpac/issues/2872 | 2,348,155,759 | 2,872 | 6,086 |
CVE-2024-6063 | 2024-06-17T21:15:51.443 | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.7,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/287... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/2873 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | ## version
```shell
./MP4Box -version
MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master
(c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: http... | Null pointer deference in filters/dmx_m2ts.c:1215 | https://api.github.com/repos/gpac/gpac/issues/2873/comments | 5 | 2024-06-12T08:32:57Z | 2024-09-27T11:43:26Z | https://github.com/gpac/gpac/issues/2873 | 2,348,158,622 | 2,873 | 6,087 |
CVE-2024-6064 | 2024-06-17T21:15:51.727 | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. Th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"416"
] | 416 | https://github.com/gpac/gpac/issues/2874 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | ## version
```shell
./MP4Box -version
MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master
(c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: http... | Heap-use-after-free scene_manager/loader_xmt.c:531 in xmt_resolve_od_links | https://api.github.com/repos/gpac/gpac/issues/2874/comments | 2 | 2024-06-12T08:34:24Z | 2024-06-18T07:43:59Z | https://github.com/gpac/gpac/issues/2874 | 2,348,161,533 | 2,874 | 6,088 |
CVE-2024-6065 | 2024-06-17T21:15:52.007 | A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the pu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/ppp-src/CVE/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268793"
},
{
"source": "cna@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BF7A73B7-CA75-4CF3-AE1D-54B35F99D710",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/4 | [
"Exploit"
] | github.com | [
"ppp-src",
"CVE"
] | # Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bakery Online Ordering System Using PHP and MySQL Database
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/
# AFFECTED A... | Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/4/comments | 0 | 2024-06-16T23:28:05Z | 2024-06-16T23:28:05Z | https://github.com/ppp-src/CVE/issues/4 | 2,356,047,127 | 4 | 6,089 |
CVE-2024-6084 | 2024-06-18T01:15:20.333 | A vulnerability has been found in itsourcecode Pool of Bethesda Online Reservation System up to 1.0 and classified as critical. Affected by this vulnerability is the function uploadImage of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attac... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Laster-dev/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268825"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206",
"versionEndExcluding": null,
"versionEndIncluding": null,... | [
"434"
] | 434 | https://github.com/Laster-dev/CVE/issues/2 | [
"Exploit"
] | github.com | [
"Laster-dev",
"CVE"
] | # Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Pool of Bethesda Online Reservation System Using PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/
# AFFECTED AND/OR FI... | Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload | https://api.github.com/repos/Laster-dev/CVE/issues/2/comments | 0 | 2024-06-17T14:20:59Z | 2024-06-17T14:23:22Z | https://github.com/Laster-dev/CVE/issues/2 | 2,357,481,064 | 2 | 6,090 |
CVE-2024-6109 | 2024-06-18T12:15:12.987 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file addmeasurement.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been di... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/PHJ-doit/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.26885... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/PHJ-doit/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"PHJ-doit",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addmeasurement.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addmeasurement.php SQL injection | https://api.github.com/repos/PHJ-doit/cve/issues/1/comments | 0 | 2024-06-17T13:16:48Z | 2024-06-17T13:16:48Z | https://github.com/PHJ-doit/cve/issues/1 | 2,357,328,531 | 1 | 6,091 |
CVE-2024-6110 | 2024-06-18T12:15:13.290 | A vulnerability was found in itsourcecode Magbanua Beach Resort Online Reservation System up to 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file controller.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. T... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Laster-dev/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.268856"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:magbanua_beach_resort_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6CB7216D-7848-48BA-9A2D-BFC765A0ED26",
"versionEndExcluding": null,
"versionEndIncluding": ... | [
"434"
] | 434 | https://github.com/Laster-dev/CVE/issues/1 | [
"Exploit"
] | github.com | [
"Laster-dev",
"CVE"
] | # Itsourcecode Magbanua’s Beach Resort Online Reservation System 1.0 controller.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Magbanua’s Beach Resort Online Reservation System
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/magbanua-beach-resort-online-reservation-system/
# AFFECT... | Itsourcecode Magbanua’s Beach Resort Online Reservation System 1.0 controller.php Unrestricted Upload | https://api.github.com/repos/Laster-dev/CVE/issues/1/comments | 0 | 2024-06-17T13:45:15Z | 2024-06-17T13:45:15Z | https://github.com/Laster-dev/CVE/issues/1 | 2,357,394,445 | 1 | 6,092 |
CVE-2024-6111 | 2024-06-18T13:15:52.193 | A vulnerability classified as critical has been found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.26... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206",
"versionEndExcluding": null,
"versionEndIncluding": null,... | [
"89"
] | 89 | https://github.com/wangyuan-ui/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pool of Bethesda Online Reservation System Using PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/
# AFFECTED AND/OR FIXED VERSION... | Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection | https://api.github.com/repos/wangyuan-ui/CVE/issues/1/comments | 0 | 2024-06-18T04:36:29Z | 2024-06-18T04:36:29Z | https://github.com/wangyuan-ui/CVE/issues/1 | 2,358,872,827 | 1 | 6,093 |
CVE-2024-6112 | 2024-06-18T13:15:52.550 | A vulnerability classified as critical was found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument log_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.26... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206",
"versionEndExcluding": null,
"versionEndIncluding": null,... | [
"89"
] | 89 | https://github.com/wangyuan-ui/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Pool of Bethesda Online Reservation System Using PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/
# AFFECTED AND/OR FIXED VERSION... | Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection | https://api.github.com/repos/wangyuan-ui/CVE/issues/2/comments | 0 | 2024-06-18T04:39:57Z | 2024-06-18T04:40:28Z | https://github.com/wangyuan-ui/CVE/issues/2 | 2,358,881,049 | 2 | 6,094 |
CVE-2024-6114 | 2024-06-18T13:15:52.897 | A vulnerability classified as critical has been found in itsourcecode Monbela Tourist Inn Online Reservation System up to 1.0. Affected is an unknown function of the file controller.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.26... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:monbela_tourist_inn_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E689E6B3-30E9-405A-A3AB-A5597F84A664",
"versionEndExcluding": null,
"versionEndIncluding": nu... | [
"434"
] | 434 | https://github.com/wangyuan-ui/CVE/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Monbela Tourist In Online Reservation System Using PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/monbela-tourist-inn-online-reservation-system/
... | Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload | https://api.github.com/repos/wangyuan-ui/CVE/issues/4/comments | 0 | 2024-06-18T04:46:56Z | 2024-06-18T04:48:47Z | https://github.com/wangyuan-ui/CVE/issues/4 | 2,358,888,461 | 4 | 6,095 |
CVE-2024-6115 | 2024-06-18T13:15:53.267 | A vulnerability classified as critical was found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file add_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.26... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741",
"versionEndExcluding": null,
"versionEndIncluding": nu... | [
"434"
] | 434 | https://github.com/wangyuan-ui/CVE/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Simple Online Hotel Reservation System in PHP Project With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/simple-hotel-onlin... | Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload | https://api.github.com/repos/wangyuan-ui/CVE/issues/5/comments | 0 | 2024-06-18T04:51:01Z | 2024-06-18T04:51:01Z | https://github.com/wangyuan-ui/CVE/issues/5 | 2,358,892,810 | 5 | 6,096 |
CVE-2024-6116 | 2024-06-18T14:15:12.440 | A vulnerability, which was classified as critical, has been found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this issue is some unknown functionality of the file edit_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be launched remotely. The expl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.26... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741",
"versionEndExcluding": null,
"versionEndIncluding": nu... | [
"434"
] | 434 | https://github.com/wangyuan-ui/CVE/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Simple Online Hotel Reservation System in PHP Project With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/simple-hotel-onli... | Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload | https://api.github.com/repos/wangyuan-ui/CVE/issues/6/comments | 0 | 2024-06-18T04:55:42Z | 2024-06-18T04:55:42Z | https://github.com/wangyuan-ui/CVE/issues/6 | 2,358,897,857 | 6 | 6,097 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.