cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2024-24146
2024-02-29T01:44:11.657
A memory leak issue discovered in parseSWF_DEFINEBUTTON in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/307
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_DEFINEBUTTON
https://api.github.com/repos/libming/libming/issues/307/comments
1
2024-01-12T22:46:35Z
2024-02-21T22:35:18Z
https://github.com/libming/libming/issues/307
2,079,829,395
307
5,996
CVE-2024-24147
2024-02-29T01:44:11.693
A memory leak issue discovered in parseSWF_FILLSTYLEARRAY in libming v0.4.8 allows attackers to cause s denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/311
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_FILLSTYLEARRAY
https://api.github.com/repos/libming/libming/issues/311/comments
1
2024-01-13T00:00:25Z
2024-02-21T22:33:33Z
https://github.com/libming/libming/issues/311
2,079,901,582
311
5,997
CVE-2024-24149
2024-02-29T01:44:11.737
A memory leak issue discovered in parseSWF_GLYPHENTRY in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/310
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_GLYPHENTRY
https://api.github.com/repos/libming/libming/issues/310/comments
1
2024-01-12T23:51:34Z
2024-02-21T22:35:36Z
https://github.com/libming/libming/issues/310
2,079,896,237
310
5,998
CVE-2024-24150
2024-02-29T01:44:11.777
A memory leak issue discovered in parseSWF_TEXTRECORD in libming v0.4.8 allows attackers to cause a denial of service via a crafted SWF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/309
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
### Envrionment ```bash ubuntu  ~/lab/libming/util   master  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/libming/util   master  clang -v Ubuntu clang vers...
Memory leaks on parseSWF_TEXTRECORD
https://api.github.com/repos/libming/libming/issues/309/comments
1
2024-01-12T23:44:59Z
2024-02-21T22:47:44Z
https://github.com/libming/libming/issues/309
2,079,890,770
309
5,999
CVE-2024-24155
2024-02-29T01:44:11.810
Bento4 v1.5.1-628 contains a Memory leak on AP4_Movie::AP4_Movie, parsing tracks and added into m_Tracks list, but mp42aac cannot correctly delete when we got an no audio track found error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "401" ]
401
https://github.com/axiomatic-systems/Bento4/issues/919
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
### Envrionment ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628...
Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks
https://api.github.com/repos/axiomatic-systems/Bento4/issues/919/comments
1
2024-01-13T21:23:38Z
2024-02-21T22:47:29Z
https://github.com/axiomatic-systems/Bento4/issues/919
2,080,480,764
919
6,000
CVE-2024-27517
2024-02-29T01:44:20.180
Webasyst 2.9.9 has a Cross-Site Scripting (XSS) vulnerability, Attackers can create blogs containing malicious code after gaining blog permissions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/webasyst/webasyst-framework/issues/377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "V...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webasyst:webasyst:2.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "89182418-CDDF-40D0-B2FD-683C1AD2CDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/webasyst/webasyst-framework/issues/377
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "webasyst", "webasyst-framework" ]
### **Summary** Webasyst 2.9.9 has a storage XSS vulnerability,Attackers can create blogs containing malicious code after gaining blog permissions, and even administrators only need to open the page of the blog management function (instead of the specified blog) to be triggered! ### **Details** ![image](https://gi...
Webasyst 2.9.9 has a storage XSS vulnerability
https://api.github.com/repos/webasyst/webasyst-framework/issues/377/comments
0
2024-02-21T10:56:22Z
2024-03-11T06:15:36Z
https://github.com/webasyst/webasyst-framework/issues/377
2,146,455,734
377
6,001
CVE-2024-24246
2024-02-29T20:15:41.407
Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to crash the application via the std::__shared_count() function at /bits/shared_ptr_base.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/qpdf/qpdf/issues/1123" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fe...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qpdf_project:qpdf:11.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8567C78-2FB2-4365-9A94-F2E2B896AAB7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "787" ]
787
https://github.com/qpdf/qpdf/issues/1123
[ "Exploit", "Vendor Advisory" ]
github.com
[ "qpdf", "qpdf" ]
### Description I found a heap-buffer-overflow crash when I use this instruction: ```shell /qpdf/build/qpdf/qpdf --json-input POC_qpdf11-9-0_heap-buffer-overflow output_json.pdf #Changed the name of id:000002,sig:11,src:001030+000958,time:17469012,execs:8722360,op:splice,rep:15 to POC_qpdf11-9-0_heap-buffe...
qpdf11.9.0 found a heap-buffer-overflow crash
https://api.github.com/repos/qpdf/qpdf/issues/1123/comments
4
2024-01-15T02:29:15Z
2024-02-04T23:10:11Z
https://github.com/qpdf/qpdf/issues/1123
2,081,133,505
1,123
6,002
CVE-2024-25865
2024-03-02T22:15:50.293
Cross Site Scripting (XSS) vulnerability in hexo-theme-anzhiyu v1.6.12, allows remote attackers to execute arbitrary code via the algolia search function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anzhiyu-c:hexo-theme-anzhiyu:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "771C3906-072E-404B-9559-6DC3722B8C67", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "79" ]
79
https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "anzhiyu-c", "hexo-theme-anzhiyu" ]
### 使用的 AnZhiYu 版本? | What version of AnZhiYu are you use? 1.6.12 ### 使用的浏览器? || What browse are you using? Chrome ### 是否修改过主题文件? || Has the theme files been modified? 不是 (No) ### 使用的系统? || What operating system are you using? Windows ### 问题描述 | Describe the bug ## 1、hexo博客搭建 - 安装node.js和...
[Bug]: anzhiyu主题开启algolia搜索功能存在xss漏洞
https://api.github.com/repos/anzhiyu-c/hexo-theme-anzhiyu/issues/200/comments
1
2024-02-09T12:26:44Z
2024-02-09T14:10:32Z
https://github.com/anzhiyu-c/hexo-theme-anzhiyu/issues/200
2,127,036,392
200
6,003
CVE-2019-25210
2024-03-03T21:15:49.867
An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/helm/helm/issues/7275" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://helm.sh/blog/response-cve-2019-25210/" }, { "source": "cve@mitre.org", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:helm:helm:-:*:*:*:*:*:*:*", "matchCriteriaId": "606B3397-0482-45AB-9683-716665632036", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null...
[ "200" ]
200
https://github.com/helm/helm/issues/7275
[ "Issue Tracking" ]
github.com
[ "helm", "helm" ]
<!-- If you need help or think you have found a bug, please help us with your issue by entering the following information (otherwise you can delete this text): --> Output of `helm version`: `helm version version.BuildInfo{Version:"v3.0.2", GitCommit:"19e47ee3283ae98139d98460de796c1be1e3975f", GitTreeState:"clean...
helm 3 shows secrets with --dry-run option in clear text
https://api.github.com/repos/helm/helm/issues/7275/comments
64
2019-12-19T21:19:04Z
2024-05-14T17:53:00Z
https://github.com/helm/helm/issues/7275
540,573,246
7,275
6,004
CVE-2024-28757
2024-03-10T05:15:06.570
libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Release Notes" ], "url": "http://www.openwall.com/lists/oss-security/2024/03/15/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "463A4DD2-9DA6-420C-A361-293B1166B9C6", "versionEndExcluding": "2.6.2", "versionEndIncluding": null, "versionSt...
[ "776" ]
776
https://github.com/libexpat/libexpat/issues/839
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "libexpat", "libexpat" ]
# Issue This is the public side of soon-public (access protected) oss-fuzz Expat finding: [Issue 66812: expat:xml_parse_fuzzer_UTF-16: Timeout in xml_parse_fuzzer_UTF-16](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=66812). The three key (access protected) contained links are: - Detailed Report: http...
OSS-Fuzz/ClusterFuzz finding 66812
https://api.github.com/repos/libexpat/libexpat/issues/839/comments
8
2024-03-03T22:40:00Z
2024-03-21T19:48:19Z
https://github.com/libexpat/libexpat/issues/839
2,165,602,679
839
6,005
CVE-2024-2564
2024-03-17T14:15:06.973
A vulnerability was found in PandaXGO PandaX up to 20240310 and classified as critical. This issue affects the function ExportUser of the file /apps/system/api/user.go. The manipulation of the argument filename leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/PandaXGO/PandaX/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.257063" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pandax:pandax:*:*:*:*:*:*:*:*", "matchCriteriaId": "09811585-2FBA-46CC-95B6-684FDADF7CA3", "versionEndExcluding": null, "versionEndIncluding": "2024-03-10", "versionStartExcl...
[ "24" ]
24
https://github.com/PandaXGO/PandaX/issues/6
[ "Issue Tracking" ]
github.com
[ "PandaXGO", "PandaX" ]
# pandax excel 导出任意文件覆盖 或 任意文件下载 <https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/user.go#L153-L161> <https://github.com/PandaXGO/PandaX/blob/3d265207b631b30b0826c2b6051588a2ae076d7a/apps/system/router/role.go#L84-L92> <https://github.com/PandaXGO/PandaX/blob...
pandax excel 导出 任意文件覆盖 或 任意文件下载
https://api.github.com/repos/PandaXGO/PandaX/issues/6/comments
1
2024-03-10T03:34:17Z
2024-12-04T09:34:30Z
https://github.com/PandaXGO/PandaX/issues/6
2,177,505,961
6
6,007
CVE-2024-2690
2024-03-20T10:15:11.250
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been classified as critical. Affected is an unknown function of the file /uupdate.php. The manipulation of the argument ima leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wkeyi0x1/vul-report/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257388" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/wkeyi0x1/vul-report/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wkeyi0x1", "vul-report" ]
# Online Discussion Forum Site - Arbitrary file vulnerability uploading leads to command execution + Author: liwenjie # Vendor Homepage + https://www.sourcecodester.com/php/14233/online-discussion-forum-site.html # Software Link + https://www.sourcecodester.com/download-code?nid=14233&title=Online+Discussion+Forum...
Online Discussion Forum Site - Arbitrary file vulnerability uploading leads to command execution - NEW VUL
https://api.github.com/repos/wkeyi0x1/vul-report/issues/2/comments
0
2024-03-19T17:57:09Z
2024-03-19T17:57:09Z
https://github.com/wkeyi0x1/vul-report/issues/2
2,195,621,125
2
6,008
CVE-2024-23643
2024-03-20T18:15:09.047
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.2 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in th...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/GeoWebCache/geowebcache/commit/9d010e09c784690ada8af43f594461a2553a62f0" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "F58354C1-10A5-4A55-8A22-7DADEEC5ED15", "versionEndExcluding": "2.23.2", "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/GeoWebCache/geowebcache/issues/1172
[ "Issue Tracking" ]
github.com
[ "GeoWebCache", "geowebcache" ]
null
Improve handling special characters in the GWC Seed Form
https://api.github.com/repos/GeoWebCache/geowebcache/issues/1172/comments
0
2023-10-10T16:27:09Z
2023-11-20T11:20:26Z
https://github.com/GeoWebCache/geowebcache/issues/1172
1,935,749,537
1,172
6,009
CVE-2024-23821
2024-03-20T18:15:10.407
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in th...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcache/issues/1171" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/GeoWebCache/geowebcach...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "73E1A204-C95D-4B7B-8C8A-E5639834BB97", "versionEndExcluding": "2.23.4", "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/GeoWebCache/geowebcache/issues/1171
[ "Issue Tracking" ]
github.com
[ "GeoWebCache", "geowebcache" ]
null
Improve handling special characters in the GWC Demos Page
https://api.github.com/repos/GeoWebCache/geowebcache/issues/1171/comments
0
2023-10-10T16:26:17Z
2023-11-20T11:20:28Z
https://github.com/GeoWebCache/geowebcache/issues/1171
1,935,748,316
1,171
6,010
CVE-2024-27935
2024-03-21T02:52:22.627
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Starting in version 1.35.1 and prior to version 1.36.3, a vulnerability in Deno's Node.js compatibility runtime allows for cross-session data contamination during simultaneous asynchronous reads from Node.js streams sourced from sockets or files. The issue aris...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C495C2E-08BD-43EB-9210-6FF31E09ECCF", "versionEndExcluding": "1.36.3", "versionEndIncluding": null, "versionStartExcluding": ...
[ "488" ]
488
https://github.com/denoland/deno/issues/20188
[ "Exploit", "Issue Tracking" ]
github.com
[ "denoland", "deno" ]
## Issue Description When testing two pairs of independent server-socket connections using the provided code, an unexpected data cross-reception issue occurs. The setup involves creating two separate servers, each with their corresponding client socket. The servers receive data from their respective sockets and echo t...
"node:net.Socket": Data Cross-Reception Issue Between Independent Server-Socket Pairs
https://api.github.com/repos/denoland/deno/issues/20188/comments
6
2023-08-17T08:30:44Z
2023-09-08T10:20:35Z
https://github.com/denoland/deno/issues/20188
1,854,522,183
20,188
6,011
CVE-2024-2754
2024-03-21T07:15:47.193
A vulnerability classified as critical has been found in SourceCodester Complete E-Commerce Site 1.0. Affected is an unknown function of the file /admin/users_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wkeyi0x1/vul-report/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257544" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:donbermoy:complete_e-commerce_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "511AE27B-E018-462D-83A9-DFF550393621", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "434" ]
434
https://github.com/wkeyi0x1/vul-report/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wkeyi0x1", "vul-report" ]
# Complete E-Commerce Site in PHP/MySQLi - Arbitrary file vulnerability uploading leads to command execution + Author: Shuning Yue # Vendor Homepage + https://www.sourcecodester.com/php/14234/complete-e-commerce-site-phpmysqli.html # Software Link + https://www.sourcecodester.com/download-code?nid=14234&title=Comp...
Complete E-Commerce Site in PHP/MySQLi - Arbitrary file vulnerability uploading leads to command execution
https://api.github.com/repos/wkeyi0x1/vul-report/issues/4/comments
0
2024-03-20T19:15:42Z
2024-03-20T19:15:42Z
https://github.com/wkeyi0x1/vul-report/issues/4
2,198,365,705
4
6,012
CVE-2024-2849
2024-03-23T18:15:07.770
A vulnerability classified as critical was found in SourceCodester Simple File Manager 1.0. This vulnerability affects unknown code. The manipulation of the argument photo leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257770 is the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.257770" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ganeshrkt:simple_file_manager_web_app:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3077F229-94E7-49B4-9E8E-A44CB9702353", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution + Author: FanYZ # Vendor Homepage + https://www.sourcecodester.com/upload-download-and-delete-file-using-php-mysql.html # Software Link + https://www.sourcecodester.com/si...
Simple File Manager Web App using PHP and MySQL Database Free Source Code - Arbitrary file vulnerability uploading leads to command execution
https://api.github.com/repos/CveSecLook/cve/issues/1/comments
0
2024-03-22T14:51:45Z
2024-03-22T14:51:45Z
https://github.com/CveSecLook/cve/issues/1
2,202,684,616
1
6,013
CVE-2024-2932
2024-03-27T01:15:46.830
A vulnerability classified as critical has been found in SourceCodester Online Chatting System 1.0. Affected is an unknown function of the file admin/update_room.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.258012" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:donbermoy:online_chatting_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "85923067-902A-42B7-BB5E-4C6ACE3990C0", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability + Author: WangPeng CUMT # Vendor Homepage + https://www.sourcecodester.com/php/14224/online-chatting-system-using-phpmysql.html # Software Link + https://www.sourcecodester.com/download-code?nid=14224&title=Online+Chatting+Syste...
Online Chatting System using PHP/MySQL update_room.php - SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/3/comments
0
2024-03-25T20:14:01Z
2024-03-25T20:14:01Z
https://github.com/CveSecLook/cve/issues/3
2,206,616,626
3
6,014
CVE-2024-31506
2024-04-09T18:15:10.467
Sourcecodester Online Graduate Tracer System v1.0 is vulnerable to SQL Injection via the "id" parameter in admin/admin_cs.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tamparongj03:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "48BB2CA2-9E7E-4C08-B25E-7377696BF3B5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability + Author: zhang guixiang # Vendor Homepage + https://www.sourcecodester.com/php/15904/online-graduate-tracer-system-college-ict...
Online Graduate Tracer System for College of ICT Alumni in PHP Free Source Code V1.0 admin/admin_cs.php - SQL injection vulnerability V1.0 admin/admin_cs.php - SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/4/comments
0
2024-03-27T16:28:13Z
2024-03-28T16:31:03Z
https://github.com/CveSecLook/cve/issues/4
2,211,250,054
4
6,015
CVE-2024-30916
2024-04-11T06:15:07.030
An issue was discovered in eProsima FastDDS v.2.14.0 and before, allows a local attacker to cause a denial of service (DoS) and obtain sensitive information via a crafted max_samples parameter in DurabilityService QoS component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/eProsima/Fast-DDS/issues/4609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ePros...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", "matchCriteriaId": "73596FAC-A0D1-4AC6-BB80-C9459B1EA433", "versionEndExcluding": null, "versionEndIncluding": "2.14.0", "versionStartExcl...
[ "20" ]
20
https://github.com/eProsima/Fast-DDS/issues/4609
[ "Exploit", "Issue Tracking" ]
github.com
[ "eProsima", "Fast-DDS" ]
### Is there an already existing issue for this? - [X] I have searched the existing issues ### Expected behavior When setting history_depth = 0 or max_samples = 0 in DurabilityService QoS, return bad parameter or inform inconsistent QoS. ### Current behavior Despite inconsistent QoS settings, datareader,...
Allow inconsistent about DurabilityService QoS
https://api.github.com/repos/eProsima/Fast-DDS/issues/4609/comments
1
2024-03-22T20:41:06Z
2024-04-05T20:09:51Z
https://github.com/eProsima/Fast-DDS/issues/4609
2,203,278,979
4,609
6,016
CVE-2024-3948
2024-04-18T11:15:39.300
A vulnerability was found in SourceCodester Home Clean Service System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file \admin\student.add.php of the component Photo Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuanluansec/vul/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:library_system_project:library_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD9DDE89-9456-4FAB-B277-1F80D6D9EDBC", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/xuanluansec/vul/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xuanluansec", "vul" ]
# SourceCodester Home Clean Service System in PHP Free Source Code 1.0 student_add.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Library System using PHP/MySQli with Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/12275/library-system-using-php.html # AFFECTED AND/OR FIXED VERSION(S) ...
SourceCodester Home Clean Service System in PHP Free Source Code 1.0 student_add.php Unrestricted Upload
https://api.github.com/repos/xuanluansec/vul/issues/5/comments
0
2024-04-17T17:10:01Z
2024-04-17T17:10:01Z
https://github.com/xuanluansec/vul/issues/5
2,248,786,611
5
6,017
CVE-2024-32648
2024-04-25T18:15:09.157
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to version 0.3.0, default functions don't respect nonreentrancy keys and the lock isn't emitted. No vulnerable production contracts were found. Additionally, using a lock on a `default` function is a very sparsely used pattern. As such,...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/vyp...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*", "matchCriteriaId": "65F778D8-E42E-4CDB-BF02-9406D65FD6B6", "versionEndExcluding": "0.3.0", "versionEndIncluding": null, "versionStartEx...
[ "667" ]
667
https://github.com/vyperlang/vyper/issues/2455
[ "Issue Tracking" ]
github.com
[ "vyperlang", "vyper" ]
### Version Information * vyper Version (output of `vyper --version`): v0.2.16 nonreentrant keys are allowed on default functions, e.g. ```python @external @payable @nonreentrant("default") def __default__(): pass ``` but it doesn't do anything, here's the output: ``` [seq, [if, [lt...
default functions don't respect nonreentrancy keys
https://api.github.com/repos/vyperlang/vyper/issues/2455/comments
1
2021-09-10T02:33:40Z
2021-10-04T20:14:05Z
https://github.com/vyperlang/vyper/issues/2455
992,830,789
2,455
6,018
CVE-2024-4809
2024-05-14T15:44:59.720
A vulnerability has been found in SourceCodester Open Source Clinic Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file setting.php. The manipulation of the argument logo leads to unrestricted upload. The attack can be launched remotely. The exploit h...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/26" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.263929" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nikhil-bhalerao:open_source_clinic_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "31D19E63-4EB6-42AC-AA1B-C9E734140902", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/26
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Open Source Clinic Management System in PHP with Full Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/14243/open-source-clinic-management-system-...
SourceCodester Open Source Clinic Management System in PHP with Full Source Code 1.0 setting.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/26/comments
0
2024-05-10T15:41:06Z
2024-05-10T15:41:07Z
https://github.com/CveSecLook/cve/issues/26
2,289,966,823
26
6,019
CVE-2024-4920
2024-05-16T00:15:08.563
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file registerH.php. The manipulation of the argument ima leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/27" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264455" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/27
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Site ## Vendor Homepage + https://www.sourcecodester.com/php/14234/complete-e-commerce-site-phpmysqli.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Cece Chen from W...
SourceCodester Online Discussion Forum Site 1.0 registerH.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/27/comments
0
2024-05-13T16:22:30Z
2024-05-13T16:22:30Z
https://github.com/CveSecLook/cve/issues/27
2,293,275,185
27
6,021
CVE-2024-4923
2024-05-16T02:15:07.900
A vulnerability has been found in Codezips E-Commerce Site 1.0 and classified as critical. This vulnerability affects unknown code of the file admin/addproduct.php. The manipulation of the argument profilepic leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the publi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/polaris0x1/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264460" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "434" ]
434
https://github.com/polaris0x1/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "polaris0x1", "CVE" ]
# Codezips E-commerce Site Using PHP With Source Code 1.0 admin/addproduct.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + E-commerce Site Using PHP With Source Code ## Vendor Homepage + https://codezips.com/php/e-commerce-site-using-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter +...
Codezips E-commerce Site Using PHP With Source Code 1.0 admin/addproduct.php Unrestricted Upload
https://api.github.com/repos/ppp-src/CVE/issues/1/comments
0
2024-05-14T11:37:04Z
2024-05-14T11:37:04Z
https://github.com/ppp-src/CVE/issues/1
2,295,192,061
1
6,022
CVE-2024-4945
2024-05-16T05:15:52.187
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file view_parcel.php. The manipulation of the argument id leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclos...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/28" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264480" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D0B90AE-6DFA-40B1-A97C-B445F29F3EB3", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/28
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Best courier management system project in php ## Vendor Homepage + https://www.sourcecodester.com/php/16848/best-courier-management-system-project-php.html#google_vignette ...
SourceCodester Best courier management system project in php view_parcel.php V1.0 SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/28/comments
0
2024-05-14T14:55:17Z
2024-05-15T02:18:44Z
https://github.com/CveSecLook/cve/issues/28
2,295,712,099
28
6,023
CVE-2024-4946
2024-05-16T06:15:13.547
A vulnerability was found in SourceCodester Online Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/adminHome.php. The manipulation of the argument sliderpic leads to unrestricted upload. The attack can be launched remotely...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/29" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264481" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:donbermoy:online_art_gallery_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB5104A2-50A5-41E1-8D7F-812A138D0D06", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/29
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Art Gallery Management System Project using PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14211/online-art-gallery-management-system-pr...
SourceCodester Online Art Gallery Management System Project using PHP/MySQL 1.0 admin/adminHome.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/29/comments
0
2024-05-14T15:41:58Z
2024-05-14T15:41:59Z
https://github.com/CveSecLook/cve/issues/29
2,295,816,357
29
6,024
CVE-2024-4966
2024-05-16T08:15:39.317
A vulnerability was found in SourceCodester SchoolWebTech 1.0. It has been classified as critical. Affected is an unknown function of the file /improve/home.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the publi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/30" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264534" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sinamjackson:schoolwebtech:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA9F74E9-7B76-4ABC-8E25-9525AC85DB93", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + SchoolWebTech ## Vendor Homepage + https://www.sourcecodester.com/php/6638/school-web-tech.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + zebra11 ## Vulnerable File + /improve/home.php ## VERSION(S...
SourceCodester SchoolWebTech 1.0 /improve/home.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/30/comments
0
2024-05-14T15:45:21Z
2024-05-14T15:45:21Z
https://github.com/CveSecLook/cve/issues/30
2,295,823,794
30
6,025
CVE-2024-34905
2024-05-16T15:15:47.887
FlyFish v3.0.0 was discovered to contain a buffer overflow via the password parameter on the login page. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CloudWise-OpenSource/FlyFish/issues/191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudwise:flyfish:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "46E15E56-7CF6-466D-83E9-E41842D6780E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "120" ]
120
https://github.com/CloudWise-OpenSource/FlyFish/issues/191
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CloudWise-OpenSource", "FlyFish" ]
**1. testing environment** The testing environment is VMware Workstation: Seed Ubuntu 20.04 **The version is as follows:** ![1](https://github.com/CloudWise-OpenSource/FlyFish/assets/105532049/40c3d7a1-0888-44f5-8d55-ba0c867616e2) **2. The vulnerability involves program code location and version number** **Vulne...
Flyfish has a DDoS vulnerability
https://api.github.com/repos/CloudWise-OpenSource/FlyFish/issues/191/comments
0
2024-05-04T06:26:39Z
2024-05-04T06:26:39Z
https://github.com/CloudWise-OpenSource/FlyFish/issues/191
2,278,785,038
191
6,026
CVE-2024-5046
2024-05-17T13:15:59.540
A vulnerability was found in SourceCodester Online Examination System 1.0. It has been rated as critical. This issue affects some unknown processing of the file registeracc.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/32" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264743" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:online_examination_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD6E663-A1BA-4328-BEBF-73C8D20DEA66", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/32
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Online Examination System Project ## Vendor Homepage + https://www.sourcecodester.com/php/14351/online-examination-system-project.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter ...
SourceCodester Online Examination System Project 1.0 registeracc.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/32/comments
0
2024-05-15T16:50:17Z
2024-05-15T16:50:17Z
https://github.com/CveSecLook/cve/issues/32
2,298,393,646
32
6,027
CVE-2024-5049
2024-05-17T14:15:22.407
A vulnerability, which was classified as critical, has been found in Codezips E-Commerce Site 1.0. Affected by this issue is some unknown functionality of the file admin/editproduct.php. The manipulation of the argument profilepic leads to unrestricted upload. The attack may be launched remotely. The exploit has been d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/polaris0x1/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.264746" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "434" ]
434
https://github.com/polaris0x1/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "polaris0x1", "CVE" ]
# Codezips E-commerce Site Using PHP With Source Code 1.0 admin/editproduct.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + E-commerce Site Using PHP With Source Code ## Vendor Homepage + https://codezips.com/php/e-commerce-site-using-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter ...
Codezips E-commerce Site Using PHP With Source Code 1.0 admin/editproduct.php Unrestricted Upload
https://api.github.com/repos/ppp-src/CVE/issues/2/comments
0
2024-05-16T03:14:10Z
2024-05-16T03:14:10Z
https://github.com/ppp-src/CVE/issues/2
2,299,242,580
2
6,028
CVE-2024-5116
2024-05-20T04:15:09.070
A vulnerability, which was classified as critical, has been found in SourceCodester Online Examination System 1.0. Affected by this issue is some unknown functionality of the file save.php. The manipulation of the argument vote leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/polaris0x1/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.265196" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:online_examination_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1AD6E663-A1BA-4328-BEBF-73C8D20DEA66", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/polaris0x1/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "polaris0x1", "CVE" ]
# SourceCodester Online Polling System 1.0 save.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Online Examination System Project ## Vendor Homepage + https://www.sourcecodester.com/php/14351/online-examination-system-project.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + polaris0x1 ## V...
SourceCodester Online Polling System 1.0 save.php SQL injection vulnerability
https://api.github.com/repos/ppp-src/CVE/issues/3/comments
0
2024-05-18T17:22:07Z
2024-05-18T17:22:07Z
https://github.com/ppp-src/CVE/issues/3
2,304,175,120
3
6,029
CVE-2024-5145
2024-05-20T23:15:08.533
A vulnerability was found in SourceCodester Vehicle Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file /newdriver.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated re...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/38" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.265289" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/38
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System in PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter...
SourceCodester Vehicle Management System in PHP/MySQL 1.0 newdriver.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/38/comments
0
2024-05-20T11:32:27Z
2024-05-20T11:32:28Z
https://github.com/CveSecLook/cve/issues/38
2,305,786,142
38
6,030
CVE-2024-5362
2024-05-26T12:15:08.023
A vulnerability classified as critical has been found in SourceCodester Online Hospital Management System 1.0. Affected is an unknown function of the file departmentDoctor.php. The manipulation of the argument deptid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/41" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266274" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:online_hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7AE707F-ECBF-4435-B06E-4E87FA07FC29", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/41
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Online Hospital Management System Using PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14386/online-hospital-management-system-using-phpmysql.ht...
SourceCodester Online Hospital Management System Using PHP/MySQL departmentDoctor.php V1.0 SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/41/comments
0
2024-05-23T12:08:12Z
2024-05-23T12:08:12Z
https://github.com/CveSecLook/cve/issues/41
2,312,753,429
41
6,031
CVE-2024-5377
2024-05-26T21:15:08.673
A vulnerability was found in SourceCodester Vehicle Management System 1.0. It has been classified as critical. This affects an unknown part of the file /newvehicle.php. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yuyuliq/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266289" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/yuyuliq/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yuyuliq", "cve" ]
# SourceCodester Vehicle Management System in PHP/MySQL 1.0 newvehicle.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System in PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitte...
SourceCodester Vehicle Management System in PHP/MySQL 1.0 newvehicle.php Unrestricted Upload
https://api.github.com/repos/yuyuliq/cve/issues/1/comments
0
2024-05-24T06:57:55Z
2024-05-24T06:57:55Z
https://github.com/yuyuliq/cve/issues/1
2,314,575,961
1
6,032
CVE-2024-5381
2024-05-26T23:15:22.150
A vulnerability classified as critical was found in itsourcecode Student Information Management System 1.0. Affected by this vulnerability is an unknown functionality of the file view.php. The manipulation of the argument studentId leads to sql injection. The attack can be launched remotely. The exploit has been disclo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2662...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:student_information_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC83737B-EB58-46E4-B676-6F2B29894828", "versionEndExcluding": null, "versionEndIncluding": null...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Information Management System in PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/st-columban-student-information-management-system # AFFECTED AND/OR FIXED VERSI...
Itsourcecode Student Information Management System in PHP 1.0 view.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/2/comments
0
2024-05-25T08:52:02Z
2024-05-25T08:52:02Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/2
2,316,847,327
2
6,033
CVE-2024-5390
2024-05-27T01:15:20.410
A vulnerability, which was classified as critical, was found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file listofstudent.php. The manipulation of the argument lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S...
Itsourcecode Online Student Enrollment System Project In PHP listofstudent.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/3/comments
0
2024-05-26T03:19:39Z
2024-05-26T03:19:40Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/3
2,317,412,593
3
6,034
CVE-2024-5391
2024-05-27T01:15:20.693
A vulnerability has been found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file listofsubject.php. The manipulation of the argument subjcode leads to sql injection. The attack can be launched remotely. The exploit has...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S...
Itsourcecode Online Student Enrollment System Project In PHP listofsubject.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/4/comments
0
2024-05-26T03:31:54Z
2024-05-26T05:03:24Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/4
2,317,416,662
4
6,035
CVE-2024-5392
2024-05-27T02:15:08.933
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file editSubject.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ...
Itsourcecode Online Student Enrollment System Project In PHP editSubject.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/5/comments
0
2024-05-26T03:42:45Z
2024-05-26T03:42:45Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/5
2,317,418,785
5
6,036
CVE-2024-5393
2024-05-27T02:15:09.240
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been classified as critical. This affects an unknown part of the file listofcourse.php. The manipulation of the argument idno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S)...
Itsourcecode Online Student Enrollment System Project In PHP listofcourse.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/6/comments
0
2024-05-26T03:55:14Z
2024-05-26T03:55:14Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/6
2,317,425,493
6
6,037
CVE-2024-5394
2024-05-27T02:15:09.530
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file newDept.php. The manipulation of the argument deptname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ## ...
Itsourcecode Online Student Enrollment System Project In PHP newDept.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/7/comments
0
2024-05-26T04:13:15Z
2024-05-26T04:14:08Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/7
2,317,452,360
7
6,038
CVE-2024-5395
2024-05-27T03:15:08.370
A vulnerability was found in itsourcecode Online Student Enrollment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file listofinstructor.php. The manipulation of the argument FullName leads to sql injection. The attack may be initiated remotely. The exploit has been disclos...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSIO...
Itsourcecode Online Student Enrollment System Project In PHP listofinstructor.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/8/comments
0
2024-05-26T04:42:31Z
2024-05-26T04:42:32Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/8
2,317,479,011
8
6,039
CVE-2024-5396
2024-05-27T03:15:08.650
A vulnerability classified as critical has been found in itsourcecode Online Student Enrollment System 1.0. Affected is an unknown function of the file newfaculty.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/9" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.2663...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/9
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERSION(S) ...
Itsourcecode Online Student Enrollment System Project In PHP newfaculty.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/9/comments
0
2024-05-26T04:49:51Z
2024-05-26T04:49:51Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/9
2,317,480,857
9
6,040
CVE-2024-5397
2024-05-27T03:15:08.923
A vulnerability classified as critical was found in itsourcecode Online Student Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file instructorSubjects.php. The manipulation of the argument instructorId leads to sql injection. The attack can be launched remotely. The exploit has...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/10" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_student_enrollment_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "206B072E-A37F-4569-B5E1-B2305B37DB95", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Student Enrollment System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-student-enrollment-system/ # AFFECTED AND/OR FIXED VERS...
Itsourcecode Online Student Enrollment System Project In PHP instructorSubjects.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/10/comments
0
2024-05-26T04:59:07Z
2024-05-26T04:59:07Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/10
2,317,483,336
10
6,041
CVE-2024-5515
2024-05-30T13:15:50.247
A vulnerability was found in SourceCodester Stock Management System 1.0. It has been classified as critical. Affected is an unknown function of the file createBrand.php. The manipulation of the argument brandName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HaojianWang/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266586" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F75A0CB-D496-4651-8633-972D8FA69746", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/HaojianWang/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "HaojianWang", "cve" ]
# SourceCodester Stock Management System in PHP 1.0 createBrand.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Stock Management System in PHP ## Vendor Homepage + https://www.sourcecodester.com/php/14366/stock-management-system-php.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Wang Haoj...
SourceCodester Stock Management System in PHP 1.0 createBrand.php SQL injection vulnerability
https://api.github.com/repos/HaojianWang/cve/issues/1/comments
0
2024-05-28T04:56:11Z
2024-05-28T04:56:11Z
https://github.com/HaojianWang/cve/issues/1
2,320,120,757
1
6,042
CVE-2024-5516
2024-05-30T14:15:09.277
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file massage.php. The manipulation of the argument bid leads to sql injection. The attack can be launched remotely. The exploit has been ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266587" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": n...
[ "89" ]
89
https://github.com/ppp-src/ha/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Blood Bank Management System in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/...
Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "massage.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/3/comments
0
2024-05-29T02:22:54Z
2024-05-29T02:22:54Z
https://github.com/ppp-src/ha/issues/3
2,322,218,913
3
6,043
CVE-2024-5517
2024-05-30T15:15:50.120
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file changepwd.php. The manipulation of the argument useremail leads to sql injection. The attack may be launched remotely. The exploit has been d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/ha/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266588" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": n...
[ "89" ]
89
https://github.com/ppp-src/ha/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Blood Bank Management System in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-cod...
“Online Blood Bank Management System" in PHP 1.0 "changepwd.php" SQL injection
https://api.github.com/repos/ppp-src/ha/issues/4/comments
0
2024-05-29T02:27:59Z
2024-05-29T02:27:59Z
https://github.com/ppp-src/ha/issues/4
2,322,222,992
4
6,044
CVE-2024-5518
2024-05-30T16:15:19.327
A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown part of the file change_profile_picture.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/L1OudFd8cl09/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266589" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/L1OudFd8cl09/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "L1OudFd8cl09", "CVE" ]
# Itsourcecode Online Discussion Forum Project in PHP with Source Code v1.0 change_profile_picture.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-...
Itsourcecode Online Discussion Forum Project in PHP with Source Code v1.0 change_profile_picture.php Unrestricted Upload
https://api.github.com/repos/L1OudFd8cl09/CVE/issues/1/comments
0
2024-06-03T01:08:35Z
2024-06-03T01:27:33Z
https://github.com/L1OudFd8cl09/CVE/issues/1
2,329,970,193
1
6,045
CVE-2024-5519
2024-05-30T16:15:19.613
A vulnerability classified as critical was found in ItsourceCode Learning Management System Project In PHP 1.0. This vulnerability affects unknown code of the file login.php. The manipulation of the argument user_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/L1OudFd8cl09/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266590" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/L1OudFd8cl09/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "L1OudFd8cl09", "CVE" ]
# Itsourcecode Learning Management System Project In PHP With Source Code v1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Learning Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-sou...
Itsourcecode Learning Management System Project In PHP With Source Code v1.0 login.php SQL injection
https://api.github.com/repos/L1OudFd8cl09/CVE/issues/2/comments
0
2024-06-03T01:09:10Z
2024-06-03T01:22:04Z
https://github.com/L1OudFd8cl09/CVE/issues/2
2,329,970,652
2
6,046
CVE-2024-5588
2024-06-02T15:15:08.230
A vulnerability was found in itsourcecode Learning Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file processscore.php. The manipulation of the argument LessonID leads to sql injection. The attack can be launched remotely. The exploit has been...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/12" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.266...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:learning_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C73EA1D-9BD1-42A6-8A1B-5517519304A8", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Learning Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-w...
Itsourcecode Learning Management System Project In PHP With Source Code v1.0 processscore.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/12/comments
0
2024-05-31T04:03:32Z
2024-05-31T04:03:32Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/12
2,326,918,435
12
6,047
CVE-2024-36675
2024-06-04T22:15:10.740
LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LyLme/lylme_spage/issues/92" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/LyLme/l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B5D86CA-58F2-4545-9D9D-0BA9967C9506", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "918" ]
918
https://github.com/LyLme/lylme_spage/issues/92
[ "Exploit", "Issue Tracking" ]
github.com
[ "LyLme", "lylme_spage" ]
# Summary An SSRF (Server-Side Request Forgery) vulnerability was identified in the LyLme_spage version 1.9.5. This vulnerability allows internal network requests to be initiated and sensitive information to be retrieved by accessing a specific URL. # Details The vulnerability resides in the get_head function which ...
SSRF Vulnerability in LyLme_spage v1.9.5
https://api.github.com/repos/LyLme/lylme_spage/issues/92/comments
1
2024-05-22T05:41:55Z
2025-01-29T03:29:05Z
https://github.com/LyLme/lylme_spage/issues/92
2,309,618,181
92
6,048
CVE-2024-36779
2024-06-06T13:15:31.590
Sourcecodester Stock Management System v1.0 is vulnerable to SQL Injection via editCategories.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stock_management_system_project:stock_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48DAD43-EB1C-4267-B97D-63BBFF86C70F", "versionEndExcluding": null, "versionEndIncluding":...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Stock Management System in PHP ## Vendor Homepage + https://www.sourcecodester.com/php/14366/stock-management-system-php.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xiao h...
SourceCodester Stock Management System in PHP 1.0 editCategories.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/42/comments
0
2024-05-24T00:25:31Z
2024-05-24T04:30:13Z
https://github.com/CveSecLook/cve/issues/42
2,314,064,021
42
6,049
CVE-2024-22524
2024-06-06T22:15:10.043
dnspod-sr 0dfbd37 is vulnerable to buffer overflow.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/DNSPod/dnspod-sr/issues/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/DNSPod/d...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*", "matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "476" ]
476
https://github.com/DNSPod/dnspod-sr/issues/60
[ "Exploit", "Issue Tracking" ]
github.com
[ "DNSPod", "dnspod-sr" ]
in https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/src/init.c#L186 if `s->logpath` is not set, https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/src/io.c#L461 will use memcpy with a null pointer and will cause <img width="531" alt="image" src="ht...
global buffer overflow
https://api.github.com/repos/DNSPod/dnspod-sr/issues/60/comments
0
2023-12-27T03:45:53Z
2023-12-27T03:45:53Z
https://github.com/DNSPod/dnspod-sr/issues/60
2,056,877,351
60
6,050
CVE-2024-22525
2024-06-06T22:15:10.127
dnspod-sr 0dfbd37 contains a SEGV.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/DNSPod/dnspod-sr/issues/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/DNSPod/d...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*", "matchCriteriaId": "253A7159-E2CC-4D48-BC94-DE5A7C6D28A7", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "476" ]
476
https://github.com/DNSPod/dnspod-sr/issues/61
[ "Exploit", "Issue Tracking" ]
github.com
[ "DNSPod", "dnspod-sr" ]
in https://github.com/DNSPod/dnspod-sr/blob/0dfbd37b11b4c54c6665914c8751f971dbdf229e/tool/client.c#L81 if given a null argv[1], a segv will be triggered by memcpy <img width="1116" alt="image" src="https://github.com/DNSPod/dnspod-sr/assets/66028849/82288557-16a5-49ce-8594-ceca5a85850a">
SEGV on client
https://api.github.com/repos/DNSPod/dnspod-sr/issues/61/comments
0
2023-12-27T04:02:23Z
2023-12-27T04:02:23Z
https://github.com/DNSPod/dnspod-sr/issues/61
2,056,885,098
61
6,051
CVE-2024-24192
2024-06-06T22:15:10.213
robdns commit d76d2e6 was discovered to contain a heap overflow via the component block->filename at /src/zonefile-insertion.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/robertdavidgraham/robdns/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/robertdavidgraham/robdns/issues/8" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:robertdavidgraham:robdns:2015-12-09:*:*:*:*:*:*:*", "matchCriteriaId": "468F3841-3FFD-4B95-A5AB-5BE25DB6066D", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "125" ]
125
https://github.com/robertdavidgraham/robdns/issues/8
[ "Issue Tracking" ]
github.com
[ "robertdavidgraham", "robdns" ]
in line https://github.com/robertdavidgraham/robdns/blob/d76d2e6817ebefe240c667aecdc478d7e3fec586/src/zonefile-insertion.c#L161 in some case the size of `block->filename` will surpass the size of `parser->src.filename`, which will leak the heap information. This can be detected by ASAN. <img width="612" alt="ima...
heap buffer overflow
https://api.github.com/repos/robertdavidgraham/robdns/issues/8/comments
1
2024-01-14T14:48:53Z
2024-10-14T02:09:51Z
https://github.com/robertdavidgraham/robdns/issues/8
2,080,758,839
8
6,052
CVE-2024-5733
2024-06-07T12:15:09.190
A vulnerability was found in itsourcecode Online Discussion Forum 1.0. It has been rated as critical. This issue affects some unknown processing of the file register_me.php. The manipulation of the argument eaddress leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the publ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kingshao0312/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "753A7DC0-ED1C-4F55-B204-582C4E09467C", "versionEndExcluding": null, "versionEndIncluding":...
[ "89" ]
89
https://github.com/kingshao0312/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kingshao0312", "cve" ]
# Itsourcecode Online Discussion Forum Project in PHP with Source Code register_me.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-cod...
Itsourcecode Online Discussion Forum Project in PHP with Source Code register_me.php SQL injection
https://api.github.com/repos/kingshao0312/cve/issues/1/comments
0
2024-06-06T08:54:07Z
2024-06-06T09:02:09Z
https://github.com/kingshao0312/cve/issues/1
2,337,719,740
1
6,053
CVE-2024-5734
2024-06-07T12:15:09.463
A vulnerability classified as critical has been found in itsourcecode Online Discussion Forum 1.0. Affected is an unknown function of the file /members/poster.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kingshao0312/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_discussion_forum_project:online_discussion_forum:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "753A7DC0-ED1C-4F55-B204-582C4E09467C", "versionEndExcluding": null, "versionEndIncluding":...
[ "434" ]
434
https://github.com/kingshao0312/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kingshao0312", "cve" ]
# Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Discussion Forum Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-discussion-forum-project-in-php-with-source-co...
Itsourcecode Online Discussion Forum Project in PHP with Source Code poster.php Unrestricted Upload
https://api.github.com/repos/kingshao0312/cve/issues/2/comments
0
2024-06-06T08:57:58Z
2024-06-06T08:57:58Z
https://github.com/kingshao0312/cve/issues/2
2,337,730,685
2
6,054
CVE-2024-36673
2024-06-07T13:15:49.547
Sourcecodester Pharmacy/Medical Store Point of Sale System 1.0 is vulnerable SQL Injection via login.php. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pharmacy\\/medical_store_point_of_sale_system_project:pharmacy\\/medical_store_point_of_sale_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F27B3402-54AA-4DAF-BEF4-E6E6EB9EFEC1", "versionEndExcludin...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/39
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code ## Vendor Homepage + ht...
SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/MySQL and Bootstrap Framework with Source Code 1.0 login.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/39/comments
0
2024-05-21T09:26:36Z
2024-05-21T09:26:36Z
https://github.com/CveSecLook/cve/issues/39
2,307,818,147
39
6,055
CVE-2024-36827
2024-06-07T19:15:24.017
An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of ebookmeta before v1.2.8 allows attackers to access sensitive information or cause a Denial of Service (DoS) via crafted XML input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnkorpushov:ebookmeta:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BA99F79-C8DC-4E7C-9572-13FAF67C04DB", "versionEndExcluding": "1.2.8", "versionEndIncluding": null, "versionStartE...
[ "611" ]
611
https://github.com/dnkorpushov/ebookmeta/issues/16#issue-2317712335
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dnkorpushov", "ebookmeta" ]
I found that when the ebookmeta version is less than 1.2.8 and the lxml version is less than 4.9.1, the ebookmeta.get_metadata function will have an xxe vulnerability. An attacker could use this vulnerability to read sensitive information from the server.
xxe vulnerability in ebookmeta.get_metadata()
https://api.github.com/repos/dnkorpushov/ebookmeta/issues/16/comments
0
2024-05-26T13:24:04Z
2024-07-09T14:48:05Z
https://github.com/dnkorpushov/ebookmeta/issues/16
2,317,712,335
16
6,056
CVE-2024-5773
2024-06-09T03:15:55.633
A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /protocol/firewall/deletemacbind.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to launch the attack remotely. The e...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/L1OudFd8cl09/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267456" }, { "source": "cna@vuldb....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/L1OudFd8cl09/CVE/issues/3
[ "Exploit" ]
github.com
[ "L1OudFd8cl09", "CVE" ]
Beijing Wangkang Technology Co., Ltd. is a leading provider of network application management equipment in China, focusing on the latest trend research and analysis in the field of network application management. It provides users with advanced network application management technology, products, and solutions, aiming ...
NS-ASG application security gateway. Attackers exploit vulnerabilities
https://api.github.com/repos/L1OudFd8cl09/CVE/issues/3/comments
0
2024-06-04T01:25:59Z
2024-06-10T01:56:59Z
https://github.com/L1OudFd8cl09/CVE/issues/3
2,332,337,521
3
6,057
CVE-2024-5774
2024-06-09T06:15:07.410
A vulnerability has been found in SourceCodester Stock Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/43" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267457" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F75A0CB-D496-4651-8633-972D8FA69746", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/43
[ "Exploit", "Issue Tracking" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability # NAME OF AFFECTED PRODUCT(S) + Stock Management System in PHP ## Vendor Homepage + https://www.sourcecodester.com/php/14366/stock-management-system-php.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xuanluansec ##...
SourceCodester Stock Management System in PHP 1.0 index.php SQL injection vulnerability
https://api.github.com/repos/CveSecLook/cve/issues/43/comments
0
2024-06-08T04:24:31Z
2024-06-08T04:24:31Z
https://github.com/CveSecLook/cve/issues/43
2,341,450,040
43
6,058
CVE-2024-5775
2024-06-09T08:15:23.373
A vulnerability was found in SourceCodester Vehicle Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file updatebill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the pu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/CveSecLook/cve/issues/44" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.267458" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warrendaloyan:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "02A258DE-6115-4843-AC16-CA63EBAB3142", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/44
[ "Exploit", "Issue Tracking" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System in PHP/MySQL ## Vendor Homepage + https://www.sourcecodester.com/php/14404/vehicle-management-system-phpmysql.html # AFFECTED AND/OR FIXED VERSION(S) ## submitter + x...
SourceCodester Vehicle Management System in PHP/MySQL 1.0 updatebill.php SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/44/comments
0
2024-06-08T04:29:27Z
2024-06-08T04:29:27Z
https://github.com/CveSecLook/cve/issues/44
2,341,453,168
44
6,059
CVE-2024-37568
2024-06-09T19:15:52.323
lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless an algorithm is specified in a jwt.decode call, HMAC verification is allowed with any asymmetric public key. (This is similar to CVE-2022-29217 and CVE-2024-33663.)
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/lepture/authlib/issues/654" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/mess...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:authlib:authlib:*:*:*:*:*:*:*:*", "matchCriteriaId": "18E429CB-390E-4F80-B36A-83E930FFDC41", "versionEndExcluding": "1.3.1", "versionEndIncluding": null, "versionStartExcludi...
[ "347" ]
347
https://github.com/lepture/authlib/issues/654
[ "Exploit", "Issue Tracking" ]
github.com
[ "lepture", "authlib" ]
# Issue description If the `algorithm` field is left unspecified when calling `jwt.decode`, the library will allow HMAC verification with ANY asymmetric public key. The library does no checks whatsoever to mitigate this. This applies to verification with the algorithms HS256, HS384, and HS512 in lieu of the asymmetr...
Algorithm confusion when verifying JSON Web Tokens with asymmetric public keys
https://api.github.com/repos/authlib/authlib/issues/654/comments
5
2024-06-03T13:51:05Z
2024-06-10T16:40:33Z
https://github.com/authlib/authlib/issues/654
2,331,218,331
654
6,060
CVE-2024-37014
2024-06-10T20:15:15.213
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/langflow-ai/langflow/issues/1973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/la...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "32795F99-77E1-46F4-ABBF-53A7616F4777", "versionEndExcluding": null, "versionEndIncluding": "0.6.19", "versionStartExcl...
[ "94" ]
94
https://github.com/langflow-ai/langflow/issues/1973
[ "Exploit", "Issue Tracking" ]
github.com
[ "langflow-ai", "langflow" ]
**Quick note** Langflow is a very interesting and useful framework for those who work with AI projects. Personally, it's a cool project to learn from. It seems the Custom Component feature was launched to support user-defined Python scripts that use the Langflow provided library. This is a great feature. However, upon...
[Security Issue] Code Execution against underlying host system in Custom Component
https://api.github.com/repos/langflow-ai/langflow/issues/1973/comments
8
2024-05-25T15:48:20Z
2024-08-02T19:56:39Z
https://github.com/langflow-ai/langflow/issues/1973
2,317,095,064
1,973
6,061
CVE-2024-36761
2024-06-12T16:15:11.983
naga v0.14.0 was discovered to contain a stack overflow via the component /wgsl/parse/mod.rs.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36761/info.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gfx-rs:naga:0.14.0:*:*:*:*:rust:*:*", "matchCriteriaId": "78CD5E32-2654-480D-99A6-B5B24501BB0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/gfx-rs/naga/issues/2591
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gfx-rs", "naga" ]
When I was using oss-fuzz to test the fuzzer wgsl_parser in my project, I found a stack overflow vulnerability that could trigger a crash by typing enough '(' into the fuzzer. The crash information is as follows: ``` ================================================================= ==132416==ERROR: AddressSanitizer...
A stack overflow vulnerability was found
https://api.github.com/repos/gfx-rs/naga/issues/2591/comments
1
2024-05-28T13:48:42Z
2024-05-31T08:38:21Z
https://github.com/gfx-rs/naga/issues/2591
2,321,122,927
2,591
6,062
CVE-2024-5898
2024-06-12T17:15:52.577
A vulnerability was found in itsourcecode Payroll Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file print_payroll.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/guiyxli/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268142...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:payroll_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "20FC2EF9-5A2B-4173-8F3B-34B209DA6A10", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/guiyxli/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "guiyxli", "cve" ]
# Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 print_payroll.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Payroll Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/payroll-system-php/ # AFFECTED AND/OR FIXED...
Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 print_payroll.php SQL injection
https://api.github.com/repos/guiyxli/cve/issues/1/comments
0
2024-06-12T02:46:13Z
2024-06-12T02:46:13Z
https://github.com/guiyxli/cve/issues/1
2,347,680,282
1
6,063
CVE-2024-37629
2024-06-12T18:15:12.293
SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/summernote/summernote/issues/4642" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://grumpz.net/cve-2024-37629-sim...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:summernote:summernote:0.8.18:*:*:*:*:*:*:*", "matchCriteriaId": "D350F186-13E4-441E-9F5A-93A720A12C74", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "79" ]
79
https://github.com/summernote/summernote/issues/4642
[ "Exploit", "Issue Tracking" ]
github.com
[ "summernote", "summernote" ]
### Checklist - [X] I've looked at the [documentation](https://summernote.org/deep-dive/) to make sure the behavior isn't documented and expected. - [X] I'm sure this is an issue with Summernote, not with my app or other dependencies (Angular, Cordova, React, etc.). - [X] I've searched through the [current issues](htt...
XSS Discovered in The Code View Function - Version 0.8.18+
https://api.github.com/repos/summernote/summernote/issues/4642/comments
2
2024-05-30T06:28:28Z
2024-10-01T10:05:54Z
https://github.com/summernote/summernote/issues/4642
2,324,814,414
4,642
6,064
CVE-2024-37849
2024-06-13T14:15:13.300
A SQL Injection vulnerability in itsourcecode Billing System 1.0 allows a local attacker to execute arbitrary code in process.php via the username parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ganzhi-qcy/cve/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:billing_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E8F33BD-6CFA-4C5D-8E2A-F9E35CE5E818", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "89" ]
89
https://github.com/ganzhi-qcy/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ganzhi-qcy", "cve" ]
# Itsourcecode "Billing System " in PHP 1.0 "process.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Billing System In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter...
Itsourcecode "Billing System " in PHP 1.0 "process.php" SQL injection
https://api.github.com/repos/ganzhi-qcy/cve/issues/3/comments
0
2024-06-07T12:35:49Z
2024-10-04T07:38:47Z
https://github.com/ganzhi-qcy/cve/issues/3
2,340,350,987
3
6,065
CVE-2024-5981
2024-06-14T02:15:09.897
A vulnerability was found in itsourcecode Online House Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the publi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LiuYongXiang-git/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.268458" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:online_house_rental_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A276F952-0667-44B9-898A-4F0B94154436", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/LiuYongXiang-git/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LiuYongXiang-git", "cve" ]
# Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online House Rental System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-house-rental-system-project-in-php-w...
Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection
https://api.github.com/repos/LiuYongXiang-git/cve/issues/1/comments
0
2024-06-13T10:40:51Z
2024-06-13T10:40:51Z
https://github.com/LiuYongXiang-git/cve/issues/1
2,350,806,578
1
6,066
CVE-2024-5983
2024-06-14T02:15:10.173
A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bookPerPub.php. The manipulation of the argument pubid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Mitigation" ], "url": "https://github.com/LiuYongXiang-git/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268459" }, { "source": "cna@v...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_book_store_project:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AD59DD3-AEC8-4FEB-8580-5501B34821AE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/LiuYongXiang-git/cve/issues/2
[ "Exploit", "Mitigation" ]
github.com
[ "LiuYongXiang-git", "cve" ]
# Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 bookPerPub.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online-Bookstore-Project-In-PHP-Source-Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/ # AFFECTED AND/OR FIXE...
Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 bookPerPub.php SQL injection
https://api.github.com/repos/LiuYongXiang-git/cve/issues/2/comments
0
2024-06-13T10:44:19Z
2024-06-13T10:50:21Z
https://github.com/LiuYongXiang-git/cve/issues/2
2,350,813,076
2
6,067
CVE-2024-5984
2024-06-14T02:15:10.443
A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file book.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LiuYongXiang-git/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268460" }, { "sourc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_book_store_project:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AD59DD3-AEC8-4FEB-8580-5501B34821AE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/LiuYongXiang-git/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LiuYongXiang-git", "cve" ]
# Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 book.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online-Bookstore-Project-In-PHP-Source-Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERS...
Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 book.php SQL injection
https://api.github.com/repos/LiuYongXiang-git/cve/issues/3/comments
0
2024-06-13T10:52:17Z
2024-06-13T10:52:18Z
https://github.com/LiuYongXiang-git/cve/issues/3
2,350,828,578
3
6,068
CVE-2024-5985
2024-06-14T02:15:10.713
A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/CveSecLook/cve/issues/45" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268461" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:best_online_news_portal_project:best_online_news_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83739685-D8B6-4A14-89A7-C1AC4F28260A", "versionEndExcluding": null, "versionEndIncluding":...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/45
[ "Exploit" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Best online news portal project in php free download /admin/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + CASAP Automated Enrollment System using PHP/MySQLi with Source Code ## Vendor Homepage + https://www.sourcecodester.com/php/16067/best-online-news-portal-project-php-free-download.htm...
SourceCodester Best online news portal project in php free download /admin/index.php SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/45/comments
0
2024-06-13T11:20:09Z
2024-06-13T11:20:09Z
https://github.com/CveSecLook/cve/issues/45
2,350,883,829
45
6,069
CVE-2024-37831
2024-06-14T20:15:11.777
Itsourcecode Payroll Management System 1.0 is vulnerable to SQL Injection in payroll_items.php via the ID parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganzhi-qcy/cve/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganzhi-qcy/cve/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:payroll_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B5AA5E2-02CB-46E7-9DC9-84E4FA6D227A", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ganzhi-qcy/cve/issues/5
[ "Third Party Advisory" ]
github.com
[ "ganzhi-qcy", "cve" ]
1. [CVE ID] 2. CVE-CVE-2024-37831 3. submitter:quchunyi,yaomingjun,luowenwei,zhangxin,chenshan,tianbeibei,fengyilin,maqiutong,fuweidong,lishudong at Guangzhou University 4. [PRODUCT] 5. Itsourcecode 6. [VERSION] 7. V1.0 8. [PROBLEM TYPE] 9. SQL Injection 10. [DESCRIPTION] 11. Itsourcecode Payroll Management S...
CVE-2024-37831
https://api.github.com/repos/ganzhi-qcy/cve/issues/5/comments
0
2024-06-14T05:55:36Z
2024-10-04T07:37:20Z
https://github.com/ganzhi-qcy/cve/issues/5
2,352,575,813
5
6,070
CVE-2024-6008
2024-06-15T15:15:51.033
A vulnerability, which was classified as critical, was found in itsourcecode Online Book Store up to 1.0. Affected is an unknown function of the file /edit_book.php. The manipulation of the argument image leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/1902zdq/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.26869...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isourcecode:online_book_store_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "71AB5A7E-412A-4649-9E8D-465255D0757F", "versionEndExcluding": null, "versionEndInclu...
[ "89" ]
89
https://github.com/1902zdq/cve/issues/1
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "1902zdq", "cve" ]
# Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 edit_book.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online-Bookstore-Project-In-PHP-Source-Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/ # AFFECTED AND/OR...
Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 edit_book.php Unrestricted Upload
https://api.github.com/repos/Wumshi/cve/issues/1/comments
0
2024-06-14T06:23:27Z
2024-06-14T06:23:27Z
https://github.com/Wumshi/cve/issues/1
2,352,612,520
1
6,071
CVE-2024-6009
2024-06-15T16:15:09.830
A vulnerability has been found in itsourcecode Event Calendar 1.0 and classified as critical. Affected by this vulnerability is the function regConfirm/regDelete of the file process.php. The manipulation of the argument userId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/AutoZhou1/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.268...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:learning_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD4B5F22-F2E1-4DDB-ABEA-61B253FE76F6", "versionEndExcluding": null, "versi...
[ "89" ]
89
https://github.com/AutoZhou1/cve/issues/1
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "AutoZhou1", "cve" ]
# Itsourcecode Event Calendar In PHP v2.3 process.php v2.3 SQL injection # NAME OF AFFECTED PRODUCT(S) + Event Calendar In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/learning-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Code...
Itsourcecode Event Calendar In PHP v2.3 process.php v2.3 SQL injection
https://api.github.com/repos/Code-099/cve/issues/1/comments
0
2024-06-14T08:09:04Z
2024-06-14T08:09:05Z
https://github.com/Code-099/cve/issues/1
2,352,801,293
1
6,072
CVE-2024-6013
2024-06-15T16:15:10.137
A vulnerability was found in itsourcecode Online Book Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin_delete.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/gabriel202212/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_book_store_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F4DCA80-C02C-4BE9-83EE-294CD8ECFDD1", "versionEndExcluding": null, "vers...
[ "89" ]
89
https://github.com/gabriel202212/cve/issues/1
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "gabriel202212", "cve" ]
# Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 admin_delete.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online-Bookstore-Project-In-PHP-Source-Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source-code/ # AFFECTED AND/OR FI...
Itsourcecode Online-Bookstore-Project-In-PHP-Source-Code v1.0 admin_delete.php SQL injection
https://api.github.com/repos/gabriel202212/cve/issues/1/comments
0
2024-06-14T05:14:26Z
2024-06-14T05:14:26Z
https://github.com/gabriel202212/cve/issues/1
2,352,524,829
1
6,073
CVE-2024-6014
2024-06-15T17:15:49.100
A vulnerability classified as critical has been found in itsourcecode Document Management System 1.0. Affected is an unknown function of the file edithis.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/gabriel202212/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:document_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B896ED3E-BEFB-4226-9F2E-D703C9765BB1", "versionEndExcluding": null, "versi...
[ "89" ]
89
https://github.com/gabriel202212/cve/issues/2
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "gabriel202212", "cve" ]
# Itsourcecode Document Management System Open Source PHP v1.0 edithis.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Document Management System Open Source PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/document-management-system-open-source-php/ # AFFECTED AND/OR FIXED VERSION(S)...
Itsourcecode Document Management System Open Source PHP v1.0 edithis.php SQL injection
https://api.github.com/repos/gabriel202212/cve/issues/2/comments
0
2024-06-14T08:21:39Z
2024-06-14T08:21:39Z
https://github.com/gabriel202212/cve/issues/2
2,352,823,423
2
6,074
CVE-2024-6015
2024-06-15T17:15:49.403
A vulnerability classified as critical was found in itsourcecode Online House Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument month_of leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/chenwulin-bit/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:online_house_rental_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83FB0E1D-9D4D-40F5-8326-94970698C31F", "versionEndExcluding": null, "versi...
[ "89" ]
89
https://github.com/chenwulin-bit/cve/issues/1
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "chenwulin-bit", "cve" ]
# Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online House Rental System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-house-rental-system-project-in-php-w...
Itsourcecode Online House Rental System Project In PHP With Source Code v1.0 manage_user.php SQL injection
https://api.github.com/repos/chenwulin-bit/cve/issues/1/comments
0
2024-06-14T14:38:14Z
2024-06-14T14:38:14Z
https://github.com/chenwulin-bit/cve/issues/1
2,353,523,129
1
6,075
CVE-2024-6016
2024-06-15T19:15:48.443
A vulnerability, which was classified as critical, has been found in itsourcecode Online Laundry Management System 1.0. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/chenwulin-bit/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:laundry_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9098A3E9-9903-45B9-8F93-8F55DD9FD767", "versionEndExcluding": null, "versio...
[ "89" ]
89
https://github.com/chenwulin-bit/cve/issues/2
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "chenwulin-bit", "cve" ]
# Itsourcecode Laundry Management System Project In PHP v1.0 admin_class.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Laundry Management System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/laundry-management-system-project-in-php-with-source-code/ # AFFECTED AND/OR FI...
Itsourcecode Laundry Management System Project In PHP v1.0 admin_class.php SQL injection
https://api.github.com/repos/chenwulin-bit/cve/issues/2/comments
0
2024-06-14T14:46:54Z
2024-06-14T14:46:54Z
https://github.com/chenwulin-bit/cve/issues/2
2,353,539,007
2
6,076
CVE-2024-38461
2024-06-16T16:15:09.537
irodsServerMonPerf in iRODS before 4.3.2 attempts to proceed with use of a path even if it is not a directory.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/irods/irods/issues/7652" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/irods/irods/releases/tag/4.3.2" }, { "source": "cve@mitre.org...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B", "versionEndExcluding": "4.3.2", "versionEndIncluding": null, "versionStartExcluding":...
[ "754" ]
754
https://github.com/irods/irods/issues/7652
[ "Issue Tracking" ]
github.com
[ "irods", "irods" ]
- [x] main - [x] 4-3-stable
irodsServerMonPerf doesn't check for bad paths
https://api.github.com/repos/irods/irods/issues/7652/comments
0
2024-04-09T16:54:32Z
2024-04-09T17:39:54Z
https://github.com/irods/irods/issues/7652
2,233,889,252
7,652
6,077
CVE-2024-38462
2024-06-16T16:15:09.627
iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/irods/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B", "versionEndExcluding": "4.3.2", "versionEndIncluding": null, "versionStartExcluding":...
[ "426" ]
426
https://github.com/irods/irods/issues/7562
[ "Issue Tracking" ]
github.com
[ "irods", "irods" ]
- [x] main - [x] 4-3-stable --- ## Deprecation `msiSendMail` provides very basic functionality for sending email. iRODS exposes mechanisms for building much better email-related tools (e.g. `msiExecCmd` and Python). This microservice also adds an unnecessary dependency on the `mail` binary. With that said, ...
Deprecate `msiSendMail`
https://api.github.com/repos/irods/irods/issues/7562/comments
0
2024-03-14T15:54:03Z
2024-03-18T16:22:03Z
https://github.com/irods/irods/issues/7562
2,186,719,768
7,562
6,078
CVE-2024-38462
2024-06-16T16:15:09.627
iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/irods/irods/blob/97eb33f130349db5e01a4b85e89dd1da81460345/server/re/src/mailMS.cpp#L94-L106" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/irods/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:irods:irods:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B450EAB-6C4F-4515-8110-7716F5B2141B", "versionEndExcluding": "4.3.2", "versionEndIncluding": null, "versionStartExcluding":...
[ "426" ]
426
https://github.com/irods/irods/issues/7651
[ "Issue Tracking", "Patch" ]
github.com
[ "irods", "irods" ]
- [x] 4-3-stable - [x] irods/irods_docs ## Deprecation - Add private variable for controlling whether `msiSendMail` returns early - Add new MSI for changing the value of the variable - Requires rodsadmin privileges - Potential names for the MSI - `msi_use_deprecated_msiSendMail` - `ms...
Make `msiSendMail` opt-in
https://api.github.com/repos/irods/irods/issues/7651/comments
1
2024-04-09T16:45:59Z
2024-04-11T19:08:52Z
https://github.com/irods/irods/issues/7651
2,233,875,219
7,651
6,079
CVE-2024-6041
2024-06-16T23:15:49.417
A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ssiicckk/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.268765" }, { "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:admerc:gym_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "959641DE-44CC-4870-AEDF-5E73A4BC5687", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "89" ]
89
https://github.com/ssiicckk/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "ssiicckk", "cve" ]
# Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_user.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Gym Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/gym-management-system-project-in-php-with-source-code/...
Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_user.php SQL injection
https://api.github.com/repos/ssiicckk/cve/issues/1/comments
0
2024-06-15T08:19:54Z
2024-06-15T08:19:54Z
https://github.com/ssiicckk/cve/issues/1
2,354,643,688
1
6,080
CVE-2024-6042
2024-06-17T00:15:09.323
A vulnerability was found in itsourcecode Real Estate Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file property-detail.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Cormac315/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:real_estate_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "89CC775B-6E0F-474F-AE02-7D933814C0ED", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Cormac315/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "Cormac315", "cve" ]
# Itsourcecode Real Estate Management System Project In PHP v1.0 property-detail.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Real Estate Management System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/real-estate-management-system-project-in-php-free-download/ # AFFE...
Itsourcecode Real Estate Management System Project In PHP v1.0 property-detail.php SQL injection
https://api.github.com/repos/Cormac315/cve/issues/1/comments
0
2024-06-15T11:23:56Z
2024-06-15T11:23:57Z
https://github.com/Cormac315/cve/issues/1
2,354,765,014
1
6,081
CVE-2024-37619
2024-06-17T14:15:10.943
StrongShop v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the spec_group_id parameter at /spec/index.blade.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/Hebing123/cve/issues/45" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.strongshop.cn/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strongshop:strongshop:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C00D0882-D77C-4C00-BC4C-D0F94A2649D8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/45
[ "Exploit" ]
github.com
[ "Hebing123", "cve" ]
# Summary StrongShop v1.0 has a Reflective Cross-Site Scripting (XSS) vulnerability located in the file `resources/views/admin/product/spec/index.blade.php`. # Details The vulnerability is located in the script tag. The application does not escape the user-supplied `spec_group_id` parameter before including it in th...
StrongShop v1.0 has a reflected XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/45/comments
1
2024-05-30T02:50:20Z
2024-06-21T02:34:30Z
https://github.com/Hebing123/cve/issues/45
2,324,586,619
45
6,082
CVE-2024-37624
2024-06-17T14:15:11.680
Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /chajian/inputChajian.php. component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description" ], "url": "https://github.com/rainrocka/xinhu/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockoa:xinhu:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "D6357A91-F746-425E-91F6-6AEFD6F1C66C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/rainrocka/xinhu/issues/6
[ "Exploit", "Technical Description" ]
github.com
[ "rainrocka", "xinhu" ]
# Summary A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Xinhu RockOA v2.6.3. # Details The XSS vulnerability originates from `/include/chajian/inputChajian.php`: https://github.com/rainrocka/xinhu/blob/7a6debc029c7332756cc3cc75c7faba69639eb89/include/chajian/inputChajian.php#L100 ...
Reflected XSS Vulnerability in Xinhu RockOA v2.6.3
https://api.github.com/repos/rainrocka/xinhu/issues/6/comments
0
2024-05-31T07:18:27Z
2024-05-31T07:43:01Z
https://github.com/rainrocka/xinhu/issues/6
2,327,130,572
6
6,083
CVE-2024-37625
2024-06-17T14:15:11.790
zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/zhimengzhe/iBarn" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description" ], "url": "https://github.com/zhimengzhe/iBarn/issues/20" }, { "source": "af854a...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zhimengzhel:ibarn:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "B3DA9D8B-BD04-47E5-8D46-78B2F6EBC874", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/zhimengzhe/iBarn/issues/20
[ "Exploit", "Technical Description" ]
github.com
[ "zhimengzhe", "iBarn" ]
# Summary A reflected Cross Site Scripting (XSS) vulnerability exists in iBarn v1.5 due to improper sanitization of the `$search` parameter in the `html/index.php`, `html/pay.php`, and `html/own.php` files. Although the `htmlspecialchars` function is used to encode HTML entities, the developers utilized the flag `ENT_...
iBarn v1.5 has a reflected XSS vulnerability
https://api.github.com/repos/zhimengzhe/iBarn/issues/20/comments
0
2024-06-03T10:35:48Z
2024-06-03T10:35:48Z
https://github.com/zhimengzhe/iBarn/issues/20
2,330,789,142
20
6,084
CVE-2024-6061
2024-06-17T20:15:14.850
A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/287...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "835" ]
835
https://github.com/gpac/gpac/issues/2871
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: http...
Infinite loop in MP4Box
https://api.github.com/repos/gpac/gpac/issues/2871/comments
0
2024-06-12T08:30:30Z
2024-06-12T13:25:17Z
https://github.com/gpac/gpac/issues/2871
2,348,153,606
2,871
6,085
CVE-2024-6062
2024-06-17T20:15:15.170
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/287...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2872
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: http...
Null pointer deference in filters/load_text.c:2534
https://api.github.com/repos/gpac/gpac/issues/2872/comments
0
2024-06-12T08:31:34Z
2024-06-12T13:31:34Z
https://github.com/gpac/gpac/issues/2872
2,348,155,759
2,872
6,086
CVE-2024-6063
2024-06-17T21:15:51.443
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/287...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2873
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: http...
Null pointer deference in filters/dmx_m2ts.c:1215
https://api.github.com/repos/gpac/gpac/issues/2873/comments
5
2024-06-12T08:32:57Z
2024-09-27T11:43:26Z
https://github.com/gpac/gpac/issues/2873
2,348,158,622
2,873
6,087
CVE-2024-6064
2024-06-17T21:15:51.727
A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. Th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "416" ]
416
https://github.com/gpac/gpac/issues/2874
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## version ```shell ./MP4Box -version MP4Box - GPAC version 2.5-DEV-rev228-g11067ea92-master (c) 2000-2024 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: http...
Heap-use-after-free scene_manager/loader_xmt.c:531 in xmt_resolve_od_links
https://api.github.com/repos/gpac/gpac/issues/2874/comments
2
2024-06-12T08:34:24Z
2024-06-18T07:43:59Z
https://github.com/gpac/gpac/issues/2874
2,348,161,533
2,874
6,088
CVE-2024-6065
2024-06-17T21:15:52.007
A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the pu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/ppp-src/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268793" }, { "source": "cna@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF7A73B7-CA75-4CF3-AE1D-54B35F99D710", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/4
[ "Exploit" ]
github.com
[ "ppp-src", "CVE" ]
# Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bakery Online Ordering System Using PHP and MySQL Database ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED A...
Itsourcecode Bakery Online Ordering System Using PHP and MySQL Database 1.0 report/index.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/4/comments
0
2024-06-16T23:28:05Z
2024-06-16T23:28:05Z
https://github.com/ppp-src/CVE/issues/4
2,356,047,127
4
6,089
CVE-2024-6084
2024-06-18T01:15:20.333
A vulnerability has been found in itsourcecode Pool of Bethesda Online Reservation System up to 1.0 and classified as critical. Affected by this vulnerability is the function uploadImage of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attac...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Laster-dev/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268825" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "434" ]
434
https://github.com/Laster-dev/CVE/issues/2
[ "Exploit" ]
github.com
[ "Laster-dev", "CVE" ]
# Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Pool of Bethesda Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED AND/OR FI...
Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload
https://api.github.com/repos/Laster-dev/CVE/issues/2/comments
0
2024-06-17T14:20:59Z
2024-06-17T14:23:22Z
https://github.com/Laster-dev/CVE/issues/2
2,357,481,064
2
6,090
CVE-2024-6109
2024-06-18T12:15:12.987
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file addmeasurement.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been di...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PHJ-doit/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26885...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/PHJ-doit/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "PHJ-doit", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addmeasurement.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addmeasurement.php SQL injection
https://api.github.com/repos/PHJ-doit/cve/issues/1/comments
0
2024-06-17T13:16:48Z
2024-06-17T13:16:48Z
https://github.com/PHJ-doit/cve/issues/1
2,357,328,531
1
6,091
CVE-2024-6110
2024-06-18T12:15:13.290
A vulnerability was found in itsourcecode Magbanua Beach Resort Online Reservation System up to 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file controller.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. T...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Laster-dev/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.268856" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:magbanua_beach_resort_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6CB7216D-7848-48BA-9A2D-BFC765A0ED26", "versionEndExcluding": null, "versionEndIncluding": ...
[ "434" ]
434
https://github.com/Laster-dev/CVE/issues/1
[ "Exploit" ]
github.com
[ "Laster-dev", "CVE" ]
# Itsourcecode Magbanua’s Beach Resort Online Reservation System 1.0 controller.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Magbanua’s Beach Resort Online Reservation System ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/magbanua-beach-resort-online-reservation-system/ # AFFECT...
Itsourcecode Magbanua’s Beach Resort Online Reservation System 1.0 controller.php Unrestricted Upload
https://api.github.com/repos/Laster-dev/CVE/issues/1/comments
0
2024-06-17T13:45:15Z
2024-06-17T13:45:15Z
https://github.com/Laster-dev/CVE/issues/1
2,357,394,445
1
6,092
CVE-2024-6111
2024-06-18T13:15:52.193
A vulnerability classified as critical has been found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "89" ]
89
https://github.com/wangyuan-ui/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pool of Bethesda Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED AND/OR FIXED VERSION...
Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 login.php SQL injection
https://api.github.com/repos/wangyuan-ui/CVE/issues/1/comments
0
2024-06-18T04:36:29Z
2024-06-18T04:36:29Z
https://github.com/wangyuan-ui/CVE/issues/1
2,358,872,827
1
6,093
CVE-2024-6112
2024-06-18T13:15:52.550
A vulnerability classified as critical was found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument log_email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:pool_of_bethesda_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DE894B7-EE1B-4ABB-8881-CF3BA3911206", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "89" ]
89
https://github.com/wangyuan-ui/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Pool of Bethesda Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bakery-online-ordering-system/ # AFFECTED AND/OR FIXED VERSION...
Itsourcecode Pool of Bethesda Online Reservation System Using PHP 1.0 index.php SQL injection
https://api.github.com/repos/wangyuan-ui/CVE/issues/2/comments
0
2024-06-18T04:39:57Z
2024-06-18T04:40:28Z
https://github.com/wangyuan-ui/CVE/issues/2
2,358,881,049
2
6,094
CVE-2024-6114
2024-06-18T13:15:52.897
A vulnerability classified as critical has been found in itsourcecode Monbela Tourist Inn Online Reservation System up to 1.0. Affected is an unknown function of the file controller.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:monbela_tourist_inn_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E689E6B3-30E9-405A-A3AB-A5597F84A664", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "434" ]
434
https://github.com/wangyuan-ui/CVE/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Monbela Tourist In Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/monbela-tourist-inn-online-reservation-system/ ...
Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 controller.php Unrestricted Upload
https://api.github.com/repos/wangyuan-ui/CVE/issues/4/comments
0
2024-06-18T04:46:56Z
2024-06-18T04:48:47Z
https://github.com/wangyuan-ui/CVE/issues/4
2,358,888,461
4
6,095
CVE-2024-6115
2024-06-18T13:15:53.267
A vulnerability classified as critical was found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file add_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "434" ]
434
https://github.com/wangyuan-ui/CVE/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Simple Online Hotel Reservation System in PHP Project With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/simple-hotel-onlin...
Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 add_room.php Unrestricted Upload
https://api.github.com/repos/wangyuan-ui/CVE/issues/5/comments
0
2024-06-18T04:51:01Z
2024-06-18T04:51:01Z
https://github.com/wangyuan-ui/CVE/issues/5
2,358,892,810
5
6,096
CVE-2024-6116
2024-06-18T14:15:12.440
A vulnerability, which was classified as critical, has been found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this issue is some unknown functionality of the file edit_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be launched remotely. The expl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clivedelacruz:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEE3B1B1-BA46-42EB-BF9A-B1A7D52EF741", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "434" ]
434
https://github.com/wangyuan-ui/CVE/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Simple Online Hotel Reservation System in PHP Project With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/simple-hotel-onli...
Itsourcecode Simple Online Hotel Reservation System in PHP Project With Source Code 1.0 edit_room.php Unrestricted Upload
https://api.github.com/repos/wangyuan-ui/CVE/issues/6/comments
0
2024-06-18T04:55:42Z
2024-06-18T04:55:42Z
https://github.com/wangyuan-ui/CVE/issues/6
2,358,897,857
6
6,097