cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-6113 | 2024-06-20T06:15:10.310 | A vulnerability was found in itsourcecode Monbela Tourist Inn Online Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The identifier VDB-268865 was... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wangyuan-ui/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:janobe:monbela_tourist_inn_online_reservation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E689E6B3-30E9-405A-A3AB-A5597F84A664",
"versionEndExcluding": null,
"versionEndIncluding": nu... | [
"89"
] | 89 | https://github.com/wangyuan-ui/CVE/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wangyuan-ui",
"CVE"
] | # Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Monbela Tourist In Online Reservation System Using PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/monbela-tourist-inn-online-reservation-system/
# AFFECTED ... | Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 login.php SQL injection | https://api.github.com/repos/wangyuan-ui/CVE/issues/3/comments | 0 | 2024-06-18T04:42:44Z | 2024-06-18T04:42:44Z | https://github.com/wangyuan-ui/CVE/issues/3 | 2,358,884,062 | 3 | 6,098 |
CVE-2024-6190 | 2024-06-20T15:15:50.940 | A vulnerability was found in itsourcecode Farm Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/HryspaHodor/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.269162"
},
{
"source": "cna@vuldb.com",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/HryspaHodor/CVE/issues/2 | [
"Exploit"
] | github.com | [
"HryspaHodor",
"CVE"
] | # Itsourcecode Farm Management System In PHP With Source Code v1.0 index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Farm Management System In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED ... | Itsourcecode Farm Management System In PHP With Source Code v1.0 index.php SQL injection | https://api.github.com/repos/HryspaHodor/CVE/issues/2/comments | 0 | 2024-06-18T05:38:13Z | 2024-06-18T05:38:13Z | https://github.com/HryspaHodor/CVE/issues/2 | 2,358,954,914 | 2 | 6,099 |
CVE-2024-6191 | 2024-06-20T15:15:51.230 | A vulnerability classified as critical has been found in itsourcecode Student Management System 1.0. This affects an unknown part of the file login.php of the component Login Page. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/HryspaHodor/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.269163"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:student_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7816C1E9-D65F-4652-A2F5-27FDEAA6B33D",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/HryspaHodor/CVE/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"HryspaHodor",
"CVE"
] | # Itsourcecode "Student Management System " in PHP 1.0 "login.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Student Management System In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/student-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSI... | Itsourcecode "Student Management System " in PHP 1.0 "login.php" SQL injection | https://api.github.com/repos/HryspaHodor/CVE/issues/3/comments | 0 | 2024-06-18T05:51:27Z | 2024-06-18T05:51:27Z | https://github.com/HryspaHodor/CVE/issues/3 | 2,358,970,853 | 3 | 6,100 |
CVE-2024-6192 | 2024-06-20T15:15:51.517 | A vulnerability classified as critical was found in itsourcecode Loan Management System 1.0. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/HryspaHodor/CVE/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.269164"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:loan_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "250E4057-0CA7-43C6-8B0E-D37FEF3D3CF2",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/HryspaHodor/CVE/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"HryspaHodor",
"CVE"
] | # Itsourcecode "Loan Management System Project " in PHP 1.0 "login.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Loan Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/student-management-system-in-php-with-source-code/
# AFFECTED AND/OR ... | # Itsourcecode "Loan Management System Project " in PHP 1.0 "login.php" SQL injection | https://api.github.com/repos/HryspaHodor/CVE/issues/4/comments | 0 | 2024-06-18T05:57:17Z | 2024-06-18T05:57:17Z | https://github.com/HryspaHodor/CVE/issues/4 | 2,358,978,656 | 4 | 6,101 |
CVE-2024-6193 | 2024-06-20T16:15:15.110 | A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. This issue affects some unknown processing of the file driverprofile.php. The manipulation of the argument driverid leads to sql injection. The attack may be initiated remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/HryspaHodor/CVE/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.2... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:vehicle_management_system_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A78DEBCC-775E-4584-81CA-8C3C1DD16C4C",
"versionEndExcluding": null,
... | [
"89"
] | 89 | https://github.com/HryspaHodor/CVE/issues/5 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"HryspaHodor",
"CVE"
] | # Itsourcecode Vehicle Management System Project in PHP 1.0 driverprofile.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System Project in PHP Free Download
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/vehicle-management-system-project-in-php-free-download/
# AFFEC... | Itsourcecode Vehicle Management System Project in PHP 1.0 driverprofile.php SQL injection | https://api.github.com/repos/HryspaHodor/CVE/issues/5/comments | 0 | 2024-06-18T06:01:51Z | 2024-06-18T06:01:51Z | https://github.com/HryspaHodor/CVE/issues/5 | 2,358,984,521 | 5 | 6,102 |
CVE-2024-6194 | 2024-06-20T16:15:15.393 | A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file editmeasurement.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/HryspaHodor/CVE/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.2... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:tailoring_management_system_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "22AA317A-3C61-4F74-BB73-80E1247BCA62",
"versionEndExcluding": null,
"versionEndIn... | [
"89"
] | 89 | https://github.com/HryspaHodor/CVE/issues/6 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"HryspaHodor",
"CVE"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 editmeasurement.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 editmeasurement.php SQL injection | https://api.github.com/repos/HryspaHodor/CVE/issues/6/comments | 0 | 2024-06-18T06:06:04Z | 2024-06-18T06:06:05Z | https://github.com/HryspaHodor/CVE/issues/6 | 2,358,990,403 | 6 | 6,103 |
CVE-2024-6195 | 2024-06-20T16:15:15.680 | A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file orderadd.php. The manipulation of the argument customer leads to sql injection. The attack can be launched remotely. The exploit has been disc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/2768210355/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.26... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:tailoring_management_system_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "22AA317A-3C61-4F74-BB73-80E1247BCA62",
"versionEndExcluding": null,
"versionEndIn... | [
"89"
] | 89 | https://github.com/2768210355/cve/issues/2 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"2768210355",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 orderadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-wi... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 orderadd.php SQL injection | https://api.github.com/repos/2768210355/cve/issues/2/comments | 0 | 2024-06-18T13:16:52Z | 2024-06-18T13:16:52Z | https://github.com/2768210355/cve/issues/2 | 2,359,846,319 | 2 | 6,104 |
CVE-2024-6196 | 2024-06-20T16:15:15.967 | A vulnerability was found in itsourcecode Banking Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/2768210355/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.26... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:banking_management_system_project_in_php:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3CCE1617-AD47-4BC0-B29F-2DE2AC771A5E",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"89"
] | 89 | https://github.com/2768210355/cve/issues/1 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"2768210355",
"cve"
] | # Itsourcecode Banking Management System Project In PHP v1.0 admin_class.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Banking Management System Project In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/banking-management-system-project-in-php-free-download/
# AFFECTED AND/OR FIXED... | Itsourcecode Banking Management System Project In PHP v1.0 admin_class.php SQL injection | https://api.github.com/repos/2768210355/cve/issues/1/comments | 0 | 2024-06-18T13:13:23Z | 2024-06-18T13:13:23Z | https://github.com/2768210355/cve/issues/1 | 2,359,838,710 | 1 | 6,105 |
CVE-2024-6218 | 2024-06-21T02:15:13.090 | A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. Affected by this issue is some unknown functionality of the file busprofile.php. The manipulation of the argument busid leads to sql injection. The attack may be launched remotely. The exploit has been discl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/HryspaHodor/CVE/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.26... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adrianmercurio:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01988E3D-47DA-45BA-97FC-E6EDD88177DB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/HryspaHodor/CVE/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"HryspaHodor",
"CVE"
] | # Itsourcecode Vehicle Management System Project in PHP 1.0 busprofile.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System Project in PHP Free Download
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/vehicle-management-system-project-in-php-free-download/
# AFFECTED... | Itsourcecode Vehicle Management System Project in PHP 1.0 busprofile.php SQL injection | https://api.github.com/repos/HryspaHodor/CVE/issues/7/comments | 0 | 2024-06-20T06:07:24Z | 2024-06-20T06:07:24Z | https://github.com/HryspaHodor/CVE/issues/7 | 2,363,597,038 | 7 | 6,106 |
CVE-2024-6253 | 2024-06-22T14:15:09.673 | A vulnerability was found in itsourcecode Online Food Ordering System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /purchase.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Desenchanted/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.269420"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6AA4AA-216E-471B-9107-65E50C880042",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Desenchanted/cve/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Desenchanted",
"cve"
] | # Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "order.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Food Ordering System Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/
# AFFECTED AND/OR F... | Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "order.php" SQL injection | https://api.github.com/repos/WhisperingNeon/cve/issues/1/comments | 0 | 2024-06-21T08:49:38Z | 2024-06-21T08:54:22Z | https://github.com/WhisperingNeon/cve/issues/1 | 2,366,052,198 | 1 | 6,107 |
CVE-2024-6268 | 2024-06-23T10:15:09.753 | A vulnerability, which was classified as critical, has been found in lahirudanushka School Management System 1.0.0/1.0.1. Affected by this issue is some unknown functionality of the file login.php of the component Login Page. The manipulation of the argument email leads to sql injection. The attack may be launched remo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/lahirudanushka/School-Management-System---PHP-MySQL/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://powerful-bulb-c36.n... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA5C3F4-40FB-403D-8E42-D5A2C34C42C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/lahirudanushka/School-Management-System---PHP-MySQL/issues/2 | [
"Issue Tracking"
] | github.com | [
"lahirudanushka",
"School-Management-System---PHP-MySQL"
] | SQL injection in School Management System 1.0 allows remote attackers
> to modify or delete data, causing persistent changes to the
> application's content or behavior by using malicious SQL queries.
> [Vulnerability Type]
> SQL Injection
> [Affected Component]
> http://localhost/login.php
| SQLi in version 1 | https://api.github.com/repos/lahirudanushka/School-Management-System---PHP-MySQL/issues/2/comments | 1 | 2022-12-07T12:08:13Z | 2023-06-23T04:51:43Z | https://github.com/lahirudanushka/School-Management-System---PHP-MySQL/issues/2 | 1,481,760,784 | 2 | 6,108 |
CVE-2024-4748 | 2024-06-24T14:15:13.030 | The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server.
The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malici... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-4748"
},
{
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.pl/posts/2024/06/CVE-2024-4748"
},
{
"source": "cvd@ce... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:j11g:cruddiy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5908333-F478-4071-A90D-BEC428110174",
"versionEndExcluding": null,
"versionEndIncluding": "202312.1",
"versionStartExcludi... | [
"78"
] | 78 | https://github.com/jan-vandenberg/cruddiy/issues/67 | [
"Issue Tracking"
] | github.com | [
"jan-vandenberg",
"cruddiy"
] | Hello,
CERT PL found a security vulnerability in this repository. How can we report this privately? We don't see any security policy describing how such vulnerabilities should be reported. | Security vulnerability disclosure | https://api.github.com/repos/jan-vandenberg/cruddiy/issues/67/comments | 6 | 2023-11-21T11:21:15Z | 2024-04-16T13:27:55Z | https://github.com/jan-vandenberg/cruddiy/issues/67 | 2,004,054,193 | 67 | 6,109 |
CVE-2024-37677 | 2024-06-24T19:15:15.527 | An issue in Shenzhen Weitillage Industrial Co., Ltd the access management specialist V6.62.51215 allows a remote attacker to obtain sensitive information. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/dabaizhizhu/123/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/dabaizhizh... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:access_management_specialist_project:access_management_specialist:6.62.51215:*:*:*:*:*:*:*",
"matchCriteriaId": "5551F46C-46C5-4CA4-A02E-AEEBF3A5CFE4",
"versionEndExcluding": null,
"vers... | [
"284"
] | 284 | https://github.com/dabaizhizhu/123/issues/2 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"dabaizhizhu",
"123"
] |
Discovered as the access management specialist(门禁专家),and this type of vulnerability can be used to kill all vulnerabilities, and other products can be searched on FOFA:title="门禁专家",This vulnerability impresses nearly 6,000 IPs
<img width="775" alt="屏幕截图 2024-05-31 215047" src="https://github.com/dabaizhizhu/123/as... | An incorrect access control in the access management specialist | https://api.github.com/repos/dabaizhizhu/123/issues/2/comments | 1 | 2024-05-31T14:03:44Z | 2024-06-25T03:04:00Z | https://github.com/dabaizhizhu/123/issues/2 | 2,327,920,599 | 2 | 6,110 |
CVE-2024-37679 | 2024-06-24T19:15:15.617 | Cross Site Scripting vulnerability in Hangzhou Meisoft Information Technology Co., Ltd. Finesoft v.8.0 and before allows a remote attacker to execute arbitrary code via a crafted script to the login.jsp parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/dabaizhizhu/123/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/dabaizhizh... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:finesoft_project:finesoft:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70E70792-37E9-43F6-9270-957A167C57CF",
"versionEndExcluding": null,
"versionEndIncluding": "8.0",
"versionStar... | [
"79"
] | 79 | https://github.com/dabaizhizhu/123/issues/4 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"dabaizhizhu",
"123"
] | Discovered as Fanen Software,and this type of vulnerability can be used to kill all vulnerabilities, and other products can be searched on FOFA:title="泛恩(FineSoft)医药管理软件",There are thousands of influencing IPs
<img width="972" alt="屏幕截图 2024-06-01 190427" src="https://github.com/dabaizhizhu/123/assets/169583627/5bfcff... | Cross-site scripting exists in Finnesoft | https://api.github.com/repos/dabaizhizhu/123/issues/4/comments | 0 | 2024-06-01T11:20:12Z | 2024-06-01T11:20:12Z | https://github.com/dabaizhizhu/123/issues/4 | 2,329,086,272 | 4 | 6,111 |
CVE-2024-37680 | 2024-06-24T19:15:15.697 | Hangzhou Meisoft Information Technology Co., Ltd. FineSoft <=8.0 is affected by Cross Site Scripting (XSS) which allows remote attackers to execute arbitrary code. Enter any account and password, click Login, the page will report an error, and a controllable parameter will appear at the URL:weburl. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/dabaizhizhu/123/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/dabaizhizh... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:finesoft_project:finesoft:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70E70792-37E9-43F6-9270-957A167C57CF",
"versionEndExcluding": null,
"versionEndIncluding": "8.0",
"versionStar... | [
"79"
] | 79 | https://github.com/dabaizhizhu/123/issues/5 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"dabaizhizhu",
"123"
] | Discovered as Fanen Software,and this type of vulnerability can be used to kill all vulnerabilities, and other products can be searched on FOFA:title="泛恩(FineSoft)医药管理软件",There are thousands of influencing IPs
<img width="921" alt="image" src="https://github.com/dabaizhizhu/123/assets/169583627/eb936461-f19d-4f39-aba3... | Cross-site scripting exists in Finnesoft | https://api.github.com/repos/dabaizhizhu/123/issues/5/comments | 0 | 2024-06-01T11:31:59Z | 2024-06-01T11:31:59Z | https://github.com/dabaizhizhu/123/issues/5 | 2,329,091,419 | 5 | 6,112 |
CVE-2024-6372 | 2024-06-27T13:16:02.440 | A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. This affects an unknown part of the file customeradd.php. The manipulation of the argument fullname/address/phonenumber/sex/email/city/comment leads to sql injection. It is possible to initiate the attack remot... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Galaxy-lrc/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.269805"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Galaxy-lrc/cve/issues/1 | [
"Exploit"
] | github.com | [
"Galaxy-lrc",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeradd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeradd.php SQL injection | https://api.github.com/repos/Galaxy-lrc/cve/issues/1/comments | 0 | 2024-06-26T11:04:10Z | 2024-06-26T11:04:10Z | https://github.com/Galaxy-lrc/cve/issues/1 | 2,375,036,130 | 1 | 6,113 |
CVE-2024-6373 | 2024-06-27T13:16:02.893 | A vulnerability has been found in itsourcecode Online Food Ordering System up to 1.0 and classified as critical. This vulnerability affects unknown code of the file /addproduct.php. The manipulation of the argument photo leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Abyssun/abyssun-/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.269806"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6AA4AA-216E-471B-9107-65E50C880042",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/Abyssun/abyssun-/issues/1 | [
"Exploit"
] | github.com | [
"Abyssun",
"abyssun-"
] | # itsourcecode "Online Food Ordering System Project " 1.0 product.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online Food Ordering System Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/
# AFFECTED AND/OR FI... | itsourcecode "Online Food Ordering System Project " 1.0 product.php Unrestricted Upload | https://api.github.com/repos/Abyssun/abyssun-/issues/1/comments | 0 | 2024-06-26T05:18:34Z | 2024-06-26T05:18:34Z | https://github.com/Abyssun/abyssun-/issues/1 | 2,374,310,911 | 1 | 6,114 |
CVE-2024-5735 | 2024-06-28T12:15:10.117 | Full Path Disclosure vulnerability in AdmirorFrames Joomla! extension in afHelper.php script allows an unauthorised attacker to retrieve location of web root folder. This issue affects AdmirorFrames: before 5.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/"
},
{
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.pl/posts/2024/06/CVE-2024-5735/"
},
{
"source": "cvd@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*",
"matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC",
"versionEndExcluding": "5.0",
"versionEndIncluding": null,
... | [
"497"
] | 497 | https://github.com/vasiljevski/admirorframes/issues/3 | [
"Issue Tracking"
] | github.com | [
"vasiljevski",
"admirorframes"
] | Hello.
Where can we safely report security issues in this project?
Regards. | Security Issues | https://api.github.com/repos/vasiljevski/admirorframes/issues/3/comments | 8 | 2024-01-26T10:23:25Z | 2024-06-28T11:53:11Z | https://github.com/vasiljevski/admirorframes/issues/3 | 2,101,961,100 | 3 | 6,115 |
CVE-2024-37741 | 2024-06-28T13:15:02.860 | OpenPLC 3 through 9cd8f1b allows XSS via an SVG document as a profile picture. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://1d8.github.io/cves/cve_2024_37741/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/thiagoralves/OpenPLC_v3/blob/9cd8f1b53a50f9d38708096bfc72bcbb1ef47343/webserver/pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:openplcproject:openplc_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7624BE59-886B-421D-96CC-105F185AE070",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | [
"79"
] | 79 | https://github.com/thiagoralves/OpenPLC_v3/issues/242 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"thiagoralves",
"OpenPLC_v3"
] | Git: https://github.com/thiagoralves/OpenPLC_v3
# Stored XSS Via Profile Image Upload
## Reproduction
Use this payload & save it as `image.svg`:
```svg
<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.... | Vulnerability Found - Stored XSS via SVG File Upload | https://api.github.com/repos/thiagoralves/OpenPLC_v3/issues/242/comments | 2 | 2024-06-03T18:10:13Z | 2025-03-20T12:02:01Z | https://github.com/thiagoralves/OpenPLC_v3/issues/242 | 2,331,757,145 | 242 | 6,116 |
CVE-2024-6387 | 2024-07-01T13:15:06.467 | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4312"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4340"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C",
"versionEndExcluding": "4.4",
"versionEndIncluding": null,
"versionStartExcluding... | [
"362"
] | 362 | https://github.com/AlmaLinux/updates/issues/629 | null | github.com | [
"AlmaLinux",
"updates"
] | ALSA-2024:4312: openssh security update (Important)
Severity: Important
Description
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Possible remote c... | Release openssh-8.7p1-38.el9_4.1 ALSA-2024:4312 | https://api.github.com/repos/AlmaLinux/updates/issues/629/comments | 20 | 2024-07-03T16:55:09Z | 2024-07-04T06:33:40Z | https://github.com/AlmaLinux/updates/issues/629 | 2,389,071,003 | 629 | 6,117 |
CVE-2024-6387 | 2024-07-01T13:15:06.467 | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4312"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4340"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C",
"versionEndExcluding": "4.4",
"versionEndIncluding": null,
"versionStartExcluding... | [
"362"
] | 362 | https://github.com/Azure/AKS/issues/4379 | null | github.com | [
"Azure",
"AKS"
] | It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials.
https://ubuntu.com/security/CVE-2024-6387
**AKS Information**
Upgrade your Ubuntu node image to [202407.03.0](https://git... | CVE-2024-6387: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server | https://api.github.com/repos/Azure/AKS/issues/4379/comments | 18 | 2024-07-02T15:26:15Z | 2024-07-30T18:19:50Z | https://github.com/Azure/AKS/issues/4379 | 2,386,561,070 | 4,379 | 6,118 |
CVE-2024-6387 | 2024-07-01T13:15:06.467 | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4312"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4340"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C",
"versionEndExcluding": "4.4",
"versionEndIncluding": null,
"versionStartExcluding... | [
"362"
] | 362 | https://github.com/PowerShell/Win32-OpenSSH/issues/2249 | null | github.com | [
"PowerShell",
"Win32-OpenSSH"
] | ### Request for information
CVE-2024-6387 (stylized as regreSSHion) is a Remote **Unauthenticated** Code Execution vulnerability in `sshd` in glibc-based Linux systems, discovered by [Qualys](https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerab... | Please confirm which versions (if any) are vulnerable to CVE-2024-6387 | https://api.github.com/repos/PowerShell/Win32-OpenSSH/issues/2249/comments | 14 | 2024-07-03T03:21:26Z | 2024-07-12T16:48:12Z | https://github.com/PowerShell/Win32-OpenSSH/issues/2249 | 2,387,569,969 | 2,249 | 6,119 |
CVE-2024-6387 | 2024-07-01T13:15:06.467 | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4312"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4340"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C",
"versionEndExcluding": "4.4",
"versionEndIncluding": null,
"versionStartExcluding... | [
"362"
] | 362 | https://github.com/microsoft/azurelinux/issues/9555 | null | github.com | [
"microsoft",
"azurelinux"
] | Update openssh to version 9.8p1 to mitigate CVE-2024-6387 (https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server)
We are currently on version 8.9p1 https://github.com/microsoft/azurelinux/blob/2.0/SPECS/openssh/openssh.spe... | OpenSSH critical vulnerability CVE-2024-6387 | https://api.github.com/repos/microsoft/azurelinux/issues/9555/comments | 3 | 2024-07-02T07:57:56Z | 2024-07-05T15:37:39Z | https://github.com/microsoft/azurelinux/issues/9555 | 2,385,524,600 | 9,555 | 6,120 |
CVE-2024-6387 | 2024-07-01T13:15:06.467 | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4312"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4340"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C",
"versionEndExcluding": "4.4",
"versionEndIncluding": null,
"versionStartExcluding... | [
"362"
] | 362 | https://github.com/oracle/oracle-linux/issues/149 | null | github.com | [
"oracle",
"oracle-linux"
] | Description from RH:
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that ar... | OL9 and CVE-2024-6387 | https://api.github.com/repos/oracle/oracle-linux/issues/149/comments | 1 | 2024-07-01T14:03:56Z | 2024-07-01T14:10:24Z | https://github.com/oracle/oracle-linux/issues/149 | 2,383,949,893 | 149 | 6,121 |
CVE-2024-6387 | 2024-07-01T13:15:06.467 | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4312"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:4340"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C",
"versionEndExcluding": "4.4",
"versionEndIncluding": null,
"versionStartExcluding... | [
"362"
] | 362 | https://github.com/rapier1/hpn-ssh/issues/87 | null | github.com | [
"rapier1",
"hpn-ssh"
] | The latest release of the hpn-ssh was based on OpenSSH 9.7, which is vulnerable to the regression of CVE-2006-5051, according to [the report](https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt)
Thought it is worth raising concern about that problem, I wish I did not intervene in the normal process of de... | [Security Issue] hpn-ssh seems be to vulnerable to a critical threat CVE-2024-6387 | https://api.github.com/repos/rapier1/hpn-ssh/issues/87/comments | 7 | 2024-07-01T12:15:54Z | 2024-07-03T18:28:26Z | https://github.com/rapier1/hpn-ssh/issues/87 | 2,383,690,887 | 87 | 6,122 |
CVE-2024-38953 | 2024-07-01T14:15:05.600 | phpok 6.4.003 contains a Cross Site Scripting (XSS) vulnerability in the ok_f() method under the framework/api/upload_control.php file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/qinggan/phpok/issues/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/qinggan/php... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpok:phpok:6.4.003:*:*:*:*:*:*:*",
"matchCriteriaId": "BE377B1F-6F96-47F2-A732-EF6A068CAA71",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/qinggan/phpok/issues/17 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"qinggan",
"phpok"
] | In the ok_f() method under the framework/api/upload_control.php file, there exists an issue where guest users can write HTML files in base64 format.

These if statements can pass through with the default given values.
Add... | The PHPok 6.4.003 has an XSS vulnerability | https://api.github.com/repos/qinggan/phpok/issues/17/comments | 0 | 2024-06-11T02:49:41Z | 2024-06-11T02:49:41Z | https://github.com/qinggan/phpok/issues/17 | 2,345,256,673 | 17 | 6,123 |
CVE-2024-6438 | 2024-07-02T11:15:11.027 | A vulnerability has been found in Hitout Carsale 1.0 and classified as critical. This vulnerability affects unknown code of the file OrderController.java. The manipulation of the argument orderBy leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Hitout/carsale/issues/23"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.270166"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitout:carsale:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "80E1087B-FD78-44F8-BDB9-6CA4FE559F91",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"89"
] | 89 | https://github.com/Hitout/carsale/issues/23 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Hitout",
"carsale"
] | SQL injection vulnerability in Hitout litemall v.1.0 allows a remote attacker to obtain sensitive information via the orderBy parameters of the OrderController.java component.
1.Steps to reproduce (复现步骤)
访问销售管理,进行查询,获取数据包
<img width="1151" alt="image" src="https://github.com/Hitout/carsale/assets/83712127/97a357ef-a... | SQL Injection Vulnerability in OrderController.java | https://api.github.com/repos/Hitout/carsale/issues/23/comments | 0 | 2024-06-25T11:32:57Z | 2024-06-25T11:32:57Z | https://github.com/Hitout/carsale/issues/23 | 2,372,450,382 | 23 | 6,124 |
CVE-2024-39143 | 2024-07-02T14:15:13.990 | A stored cross-site scripting (XSS) vulnerability exists in ResidenceCMS 2.10.1 that allows a low-privilege user to create malicious property content with HTML inside which acts as a stored XSS payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/Coderberg/ResidenceCMS/issues/128"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:coderberg:residencecms:2.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E0C50F5F-9654-44ED-BF59-B1B7D600C1ED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"79"
] | 79 | https://github.com/Coderberg/ResidenceCMS/issues/128 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"Coderberg",
"ResidenceCMS"
] | A stored cross-site scripting (XSS) vulnerability exists in ResidenceCMS 2.10.1 that allows a low-privilege user to create malicious property content with HTML inside it, which acts as a stored XSS payload. If this property page is visited by anyone including the administrator, then the XSS payload will be triggered.
... | A stored cross-site scripting (XSS) vulnerability exists in ResidenceCMS 2.10.1 | https://api.github.com/repos/Coderberg/ResidenceCMS/issues/128/comments | 4 | 2024-06-17T05:57:11Z | 2024-07-08T00:48:29Z | https://github.com/Coderberg/ResidenceCMS/issues/128 | 2,356,451,596 | 128 | 6,125 |
CVE-2024-6453 | 2024-07-02T22:15:05.077 | A vulnerability was found in itsourcecode Farm Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /quarantine.php?id=3. The manipulation of the argument pigno/breed/reason leads to sql injection. The attack can be launched remotely. The exploi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/7u7777/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.270241"
},
{
"source": "cna@vuldb.com",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/7u7777/cve/issues/3 | [
"Exploit"
] | github.com | [
"7u7777",
"cve"
] | # Itsourcecode Farm Management System In PHP v1.0 quarantine.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Farm Management System In PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ k... | Itsourcecode Farm Management System In PHP v1.0 quarantine.php SQL injection | https://api.github.com/repos/7u7777/cve/issues/3/comments | 0 | 2024-07-02T11:37:13Z | 2024-07-02T11:37:13Z | https://github.com/7u7777/cve/issues/3 | 2,386,023,835 | 3 | 6,126 |
CVE-2024-39683 | 2024-07-03T20:15:04.840 | ZITADEL is an open-source identity infrastructure tool. ZITADEL provides users the ability to list all user sessions of the current user agent (browser). Starting in version 2.53.0 and prior to versions 2.53.8, 2.54.5, and 2.55.1, due to a missing check, user sessions without that information (e.g. when created though ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "security-advisories@github.com",
"tags": [
"Permissions Required",
"URL Repurposed"
],
"url": "https://discord.com/channels/927474939156643850/1254096852937347153"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5976968D-F1B6-4FE8-8E2B-98BD1013BB3A",
"versionEndExcluding": "2.53.8",
"versionEndIncluding": null,
"versionStartExclud... | [
"200"
] | 200 | https://github.com/zitadel/zitadel/issues/8213 | [
"Issue Tracking"
] | github.com | [
"zitadel",
"zitadel"
] | ### Preflight Checklist
- [X] I could not find a solution in the documentation, the existing issues or discussions
- [x] I have joined the [ZITADEL chat](https://zitadel.com/chat)
### Environment
Self-hosted
### Version
_No response_
### Database
CockroachDB
### Database Version
_No response_
### Describe the... | [Bug]: critical bug in session's | https://api.github.com/repos/zitadel/zitadel/issues/8213/comments | 6 | 2024-06-30T08:13:59Z | 2024-07-10T07:22:50Z | https://github.com/zitadel/zitadel/issues/8213 | 2,382,142,784 | 8,213 | 6,127 |
CVE-2024-39027 | 2024-07-05T14:15:02.997 | SeaCMS v12.9 has an unauthorized SQL injection vulnerability. The vulnerability is caused by the SQL injection through the cid parameter at /js/player/dmplayer/dmku/index.php?ac=edit, which can cause sensitive database information to be leaked. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/seacms-net/CMS/issues/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/seacms-net... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"89"
] | 89 | https://github.com/seacms-net/CMS/issues/17 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"seacms-net",
"CMS"
] | # 总结
SeaCMS v12.9 存在未授权SQL注入漏洞,该漏洞源于/js/player/dmplayer/dmku/index.php?ac=edit处能够通过cid参数进行sql注入,从而导致数据库敏感信息泄露
## 漏洞介绍

js/player/dmplayer/dmku/index.php处存在SQL注入,传入ac=edit能够调用`$d->编辑弹幕($cid)`
. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/railsadminteam/rails_admin/commit/b5a287d82e2cbd1737a1a01e11ede2911cce7fef"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/r... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rails_admin_project:rails_admin:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "5835771A-4E7F-409A-939E-8442D2E9A5CE",
"versionEndExcluding": "2.3.0",
"versionEndIncluding": null,
"... | [
"79"
] | 79 | https://github.com/railsadminteam/rails_admin/issues/3686 | [
"Issue Tracking"
] | github.com | [
"railsadminteam",
"rails_admin"
] | **Describe the bug**
Storing content in a field that contains quotes results in only the content before the first quote is in the title. The rest of the content is stored in the tag as individual attributes.
_We noticed this when the word `hidden` was stored after a quote, which resulted in the cell being hidden... | StringLike field with quotes breaks out of title | https://api.github.com/repos/railsadminteam/rails_admin/issues/3686/comments | 4 | 2024-06-11T14:16:31Z | 2024-07-09T11:35:51Z | https://github.com/railsadminteam/rails_admin/issues/3686 | 2,346,558,651 | 3,686 | 6,131 |
CVE-2024-39677 | 2024-07-08T15:15:22.450 | NHibernate is an object-relational mapper for the .NET framework. A SQL injection vulnerability exists in some types implementing ILiteralType.ObjectToSQLString. Callers of these methods are exposed to the vulnerability, which includes mappings using inheritance with discriminator values; HQL queries referencing a stat... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"int... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/nhibernate/nhibernate-core/commit/b4a69d1a5ff5744312478d70308329af496e4ba9"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nhibernate:nhibernate-core:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23371DC1-350D-459D-AB4F-1E251FC87BB8",
"versionEndExcluding": "5.4.9",
"versionEndIncluding": null,
"versionS... | [
"89"
] | 89 | https://github.com/nhibernate/nhibernate-core/issues/3516 | [
"Issue Tracking"
] | github.com | [
"nhibernate",
"nhibernate-core"
] | While working with DateOnly and TimeOnly support I realized that the ObjectToSQLString method of ILiteralType is quite problematic.
**AbstractStringType**:
`"'" + (string)value + "'"`
- SQL injection
- No N-prefix for unicode (required in SQL server when the string is outside ANSI)
**AbstractCharType**:
`'... | ObjectToSQLString implementations are problematic | https://api.github.com/repos/nhibernate/nhibernate-core/issues/3516/comments | 10 | 2024-04-02T09:32:30Z | 2024-07-06T08:28:51Z | https://github.com/nhibernate/nhibernate-core/issues/3516 | 2,220,019,103 | 3,516 | 6,132 |
CVE-2024-39203 | 2024-07-08T16:15:08.570 | A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/5r1an/CVE-2024-39203/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zblogcn:z-blogphp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2467D5DF-869D-4B54-83CB-90349C9A2B87",
"versionEndExcluding": null,
"versionEndIncluding": "1.7.3.3230",
"versionStart... | [
"79"
] | 79 | https://github.com/5r1an/CVE-2024-39203/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"5r1an",
"CVE-2024-39203"
] | [CVE ID]
CVE-2024-39203
[Suggested description]
A cross-site scripting (XSS) vulnerability in the Backend Theme.
Management module of Z-BlogPHP v1.7.3 allows attackers to execute
arbitrary web scripts or HTML via a crafted payload.
[Vulnerability Type]
Cross Site Scripting (XSS)
[Vendor of Product]
https... | CVE-2024-39203 | https://api.github.com/repos/5r1an/CVE-2024-39203/issues/1/comments | 0 | 2024-07-04T02:31:36Z | 2024-07-04T02:31:36Z | https://github.com/5r1an/CVE-2024-39203/issues/1 | 2,389,798,993 | 1 | 6,133 |
CVE-2024-6237 | 2024-07-09T17:15:48.960 | A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2024:4997"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2024:5192"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A3DAF61A-58A9-41A6-A4DC-64148055B0C1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"230"
] | 230 | https://github.com/389ds/389-ds-base/issues/5989 | [
"Issue Tracking"
] | github.com | [
"389ds",
"389-ds-base"
] | **Problem to solve**
Computation of membership (like 'memberof') is a common issue. The issue is more expensive to solve when there are nested membership. For example "gives me all the groups this entry belongs to" or "gives me all subordinates having this manager". Either the LDAP client computes the values or dedica... | RFE support of inChain Matching Rule | https://api.github.com/repos/389ds/389-ds-base/issues/5989/comments | 1 | 2023-11-21T09:38:20Z | 2024-01-12T10:17:14Z | https://github.com/389ds/389-ds-base/issues/5989 | 2,003,851,471 | 5,989 | 6,134 |
CVE-2024-37873 | 2024-07-09T20:15:11.923 | SQL injection vulnerability in view_payslip.php in Itsourcecode Payroll Management System Project In PHP With Source Code 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/TThuyyy/cve1/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:itsourcecode:payroll_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "339EF973-A352-4EDB-A6C5-E41FD76AB23F",
"versionEndExcluding": null,
"versio... | [
"89"
] | 89 | https://github.com/TThuyyy/cve1/issues/2 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"TThuyyy",
"cve1"
] | # Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 view_payslip.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Payroll Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/payroll-system-php/
# AFFECTED AND... | Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 view_payslip.php SQL injection | https://api.github.com/repos/TThuyyy/cve1/issues/2/comments | 0 | 2024-06-07T13:30:36Z | 2024-06-09T05:59:31Z | https://github.com/TThuyyy/cve1/issues/2 | 2,340,468,618 | 2 | 6,135 |
CVE-2024-6652 | 2024-07-10T23:15:15.250 | A vulnerability was found in itsourcecode Gym Management System 1.0. It has been classified as critical. This affects an unknown part of the file manage_member.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/littletree7/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.271059"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adrianmercurio:gym_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "19A6E4EB-8256-48FE-BEAC-DFF12DF7D862",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/littletree7/cve/issues/1 | [
"Exploit"
] | github.com | [
"littletree7",
"cve"
] | # Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_member.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Gym Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/gym-management-system-project-in-php-with-source-cod... | Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_member.php SQL injection | https://api.github.com/repos/littletree7/cve/issues/1/comments | 0 | 2024-07-10T08:44:12Z | 2024-07-10T08:44:12Z | https://github.com/littletree7/cve/issues/1 | 2,400,132,675 | 1 | 6,136 |
CVE-2024-6653 | 2024-07-11T00:15:02.313 | A vulnerability was found in code-projects Simple Task List 1.0. It has been declared as critical. This vulnerability affects unknown code of the file loginForm.php of the component Login. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hantianj/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.271060"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:simple_task_list:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B691815C-6D04-44C0-9DB6-B189933EFC52",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/hantianj/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hantianj",
"cve"
] | # code-projects Simple Task List In PHP With Source Code v1.0 loginForm.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Simple Task List In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/simple-task-list-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ hantian
##... | code-projects Simple Task List In PHP With Source Code v1.0 loginForm.php SQL injection | https://api.github.com/repos/hantianj/cve/issues/1/comments | 0 | 2024-07-10T10:39:45Z | 2024-07-10T10:39:45Z | https://github.com/hantianj/cve/issues/1 | 2,400,390,282 | 1 | 6,137 |
CVE-2024-6728 | 2024-07-14T01:15:01.940 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file typeedit.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jeery0/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.271401"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/jeery0/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jeery0",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 typeedit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-wi... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 typeedit.php SQL injection | https://api.github.com/repos/jeery0/cve/issues/1/comments | 0 | 2024-07-11T11:39:02Z | 2024-07-11T11:42:24Z | https://github.com/jeery0/cve/issues/1 | 2,402,963,564 | 1 | 6,138 |
CVE-2024-6733 | 2024-07-14T23:15:02.290 | A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file templateedit.php. The manipulation of the argument id/title/msg leads to sql injection. The attack may be launched remotely. The exploit has been disclos... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/jiaoyanshuai/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271454"
},
{
"source": "cna@vuldb.com",
"tags": [... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/jiaoyanshuai/cve/issues/1 | [
"Exploit"
] | github.com | [
"jiaoyanshuai",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 templateedit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-ph... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 templateedit.php SQL injection | https://api.github.com/repos/jiaoyanshuai/cve/issues/1/comments | 0 | 2024-07-14T02:35:29Z | 2024-07-14T02:35:29Z | https://github.com/jiaoyanshuai/cve/issues/1 | 2,407,237,583 | 1 | 6,139 |
CVE-2024-6734 | 2024-07-15T00:15:01.913 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file templateadd.php. The manipulation of the argument title/msg leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/jiaoyanshuai/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271455"
},
{
"source": "cna@vuldb.com",
"tags": [... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/jiaoyanshuai/cve/issues/2 | [
"Exploit"
] | github.com | [
"jiaoyanshuai",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 templateadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 templateadd.php SQL injection | https://api.github.com/repos/jiaoyanshuai/cve/issues/2/comments | 0 | 2024-07-14T02:37:23Z | 2024-07-14T02:37:23Z | https://github.com/jiaoyanshuai/cve/issues/2 | 2,407,237,943 | 2 | 6,140 |
CVE-2024-6735 | 2024-07-15T00:15:02.207 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file setgeneral.php. The manipulation of the argument sitename/email/mobile/sms/currency leads to sql injection. The attack can be initiated remotely. The exploit h... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/xzyxiaohaha/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271456"
},
{
"source": "cna@vuldb.com",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/xzyxiaohaha/cve/issues/1 | [
"Exploit"
] | github.com | [
"xzyxiaohaha",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 setgeneral.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 setgeneral.php SQL injection | https://api.github.com/repos/xzyxiaohaha/cve/issues/1/comments | 0 | 2024-07-14T06:44:57Z | 2024-07-14T06:44:57Z | https://github.com/xzyxiaohaha/cve/issues/1 | 2,407,293,840 | 1 | 6,141 |
CVE-2024-6745 | 2024-07-15T11:15:02.450 | A vulnerability classified as critical has been found in code-projects Simple Ticket Booking 1.0. Affected is an unknown function of the file adminauthenticate.php of the component Login. The manipulation of the argument email/password leads to sql injection. It is possible to launch the attack remotely. The exploit ha... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xzyxiaohaha/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271476"
},
{
"source": "cna@vu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:simple_ticket_booking:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D14B5958-44A0-40EB-A3EC-02065AFD7652",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/xzyxiaohaha/cve/issues/2 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"xzyxiaohaha",
"cve"
] | # code-projects Simple Ticket Booking In PHP With Source Code v1.0 adminauthenticate.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Simple Ticket Booking In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/ticket-booking-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitte... | code-projects Simple Ticket Booking In PHP With Source Code v1.0 adminauthenticate.php SQL injection | https://api.github.com/repos/xzyxiaohaha/cve/issues/2/comments | 0 | 2024-07-15T05:51:46Z | 2024-07-15T05:51:46Z | https://github.com/xzyxiaohaha/cve/issues/2 | 2,407,912,269 | 2 | 6,142 |
CVE-2024-6746 | 2024-07-15T12:15:02.707 | A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \EasySpider\resources\app\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PART... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/NaiboWang/EasySpider/issues/466"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271477"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:easyspider:easyspider:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99029D7E-D899-4908-819E-BCE6EA9944DE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"22"
] | 22 | https://github.com/NaiboWang/EasySpider/issues/466 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"NaiboWang",
"EasySpider"
] | # 摘要
EasySpider Version 0.6.2 Windows 存在任意文件读取漏洞,攻击者可以读取EasySpider应用所在磁盘的任意文件而不受访问控制限制,该漏洞将导致严重的敏感信息泄露、系统崩溃等问题。
```
# Summary
EasySpider Version 0.6.2 for Windows has an arbitrary file read vulnerability. An attacker can read any file on the disk where the EasySpider application is located without access control re... | EasySpider Version 0.6.2 Windows 存在任意文件读取漏洞 | https://api.github.com/repos/NaiboWang/EasySpider/issues/466/comments | 2 | 2024-07-09T16:38:17Z | 2024-09-08T11:54:00Z | https://github.com/NaiboWang/EasySpider/issues/466 | 2,398,676,797 | 466 | 6,143 |
CVE-2024-39036 | 2024-07-16T19:15:12.460 | SeaCMS v12.9 is vulnerable to Arbitrary File Read via admin_safe.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/seacms-net/CMS/issues/18"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"22"
] | 22 | https://github.com/seacms-net/CMS/issues/18 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"seacms-net",
"CMS"
] | ## Summary
SeaCMS v12.9 has an arbitrary file read vulnerability in the admin/adminsafe.php file, allowing attackers to read system files after accessing the Website back end.
## Detail
file_get_contents in line 94 is the vulnerability trigger, and its argument are obtained by the GET method.

+ Online Clinic Management System In PHP With Free Source code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-clinic-management-system-php-projects-... | SourceCodester Online Clinic Management System In PHP With Free Source code 1.0 login.php SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/47/comments | 0 | 2024-06-28T15:28:44Z | 2024-06-28T16:25:30Z | https://github.com/CveSecLook/cve/issues/47 | 2,380,682,375 | 47 | 6,147 |
CVE-2024-6801 | 2024-07-17T02:15:10.367 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Student Management System 1.0. This issue affects some unknown processing of the file /add-students.php. The manipulation of the argument image leads to unrestricted upload. The attack may be initiated remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/aaajuna/demo/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271703"
},
{
"source": "cna... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:online_student_management_system_project:online_student_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "422F2579-A688-4D6E-97D2-873C5BCABFD8",
"versionEndExcluding": null,
"ver... | [
"434"
] | 434 | https://github.com/aaajuna/demo/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"aaajuna",
"demo"
] | # SourceCodester Online student management system in php free download /add-students.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Online student management system in php free download
## Vendor Homepage
+ https://www.sourcecodester.com/php/16137/online-student-management-system-php-free-download.html
# ... | SourceCodester Online student management system in php free download /add-students.php Unrestricted Upload | https://api.github.com/repos/aaajuna/demo/issues/1/comments | 0 | 2024-07-15T06:08:37Z | 2024-07-15T06:08:37Z | https://github.com/aaajuna/demo/issues/1 | 2,407,932,109 | 1 | 6,148 |
CVE-2024-6803 | 2024-07-17T03:15:02.130 | A vulnerability has been found in itsourcecode Document Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file insert.php. The manipulation of the argument anothercont leads to sql injection. The attack can be launched remotely. The exploit has been disc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/hzy11111111/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271705"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:document_management_system_project:document_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "120BA9C1-F846-4761-B02A-2880FDD0D36C",
"versionEndExcluding": null,
"versionEndInclu... | [
"89"
] | 89 | https://github.com/hzy11111111/cve/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"hzy11111111",
"cve"
] | # Itsourcecode Document Management System Open Source PHP v1.0 insert.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Document Management System Open Source PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/document-management-system-open-source-php/
# AFFECTED AND/OR FIXED VERSION(S)
... | Itsourcecode Document Management System Open Source PHP v1.0 insert.php SQL injection | https://api.github.com/repos/hzy11111111/cve/issues/3/comments | 0 | 2024-07-15T07:00:04Z | 2024-07-15T07:00:04Z | https://github.com/hzy11111111/cve/issues/3 | 2,408,006,229 | 3 | 6,149 |
CVE-2024-6808 | 2024-07-17T04:15:03.320 | A vulnerability was found in itsourcecode Simple Task List 1.0. It has been classified as critical. This affects the function insertUserRecord of the file signUp.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/qianqiusujiu/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271707"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:simple_task_list:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B691815C-6D04-44C0-9DB6-B189933EFC52",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/qianqiusujiu/cve/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"qianqiusujiu",
"cve"
] | # code-projects Simple Task List In PHP With Source Code v1.0 signUp.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Simple Task List In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/simple-task-list-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ qianqiu
## Vu... | code-projects Simple Task List In PHP With Source Code v1.0 signUp.php SQL injection | https://api.github.com/repos/qianqiusujiu/cve/issues/1/comments | 0 | 2024-07-16T02:58:08Z | 2024-07-16T02:58:08Z | https://github.com/qianqiusujiu/cve/issues/1 | 2,410,083,624 | 1 | 6,150 |
CVE-2023-43971 | 2024-07-17T22:15:03.627 | Cross Site Scripting vulnerability in ACG-faka v1.1.7 allows a remote attacker to execute arbitrary code via the encode parameter in Index.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/N0boy-0/7251856fed517eb6358d8cae03099b7b"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lizhipay:acg-faka:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD2505E-412F-45CF-B53F-0687C0D16A6B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/lizhipay/acg-faka/issues/72 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"lizhipay",
"acg-faka"
] | Get the base64 encode parameter in Index.php, which can successfully bypass the WAF and cause it to be rendered on the page.

 does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/1"
},
{
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36C67E7A-D4BB-4387-B6E3-BBD3664BAC4F",
"versionEndExcluding": "4.18.2.2",
"versionEndIncluding": null,
"versionStartEx... | [
"290"
] | 290 | https://github.com/apache/cloudstack/issues/4519 | [
"Issue Tracking"
] | github.com | [
"apache",
"cloudstack"
] | <!--
Verify first that your issue/request is not already reported on GitHub.
Also test if the latest release and master branch are affected too.
Always add information AFTER of these HTML comments, but no need to delete the comments.
-->
##### ISSUE TYPE
<!-- Pick one below and delete the rest -->
* Bug Repor... | SAML signature is optional | https://api.github.com/repos/apache/cloudstack/issues/4519/comments | 24 | 2020-12-04T14:19:36Z | 2024-07-31T10:08:53Z | https://github.com/apache/cloudstack/issues/4519 | 757,137,507 | 4,519 | 6,152 |
CVE-2024-41121 | 2024-07-19T20:15:08.180 | Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally pr... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
],
"url": "https://github.com/woodpecker-ci/woodpecker-security/issues/8"
},
{
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
],
"url": "https://github.com/woodpecker-ci/woodpec... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FFB6F4F-B936-4455-9130-B6BD0EFD9D46",
"versionEndExcluding": "2.7.0",
"versionEndIncluding": null,
"versionSta... | [
"74"
] | 74 | https://github.com/woodpecker-ci/woodpecker/issues/3924 | [
"Patch"
] | github.com | [
"woodpecker-ci",
"woodpecker"
] | # Getting privileged permissions using an escalated plugin by adjusting workspace
Dear Woodpecker Security Team,
I am writing to inform you about the possibility of running arbitrary code in a privileged container using the default configuration.
As you know, the default configuration has multiple containers tha... | Getting "privileged permissions" / "secrets value" by using (... an escalated plugin and/) by adjusting workspace | https://api.github.com/repos/woodpecker-ci/woodpecker/issues/3924/comments | 0 | 2024-07-18T00:33:36Z | 2024-10-04T14:06:28Z | https://github.com/woodpecker-ci/woodpecker/issues/3924 | 2,414,900,450 | 3,924 | 6,153 |
CVE-2024-41122 | 2024-07-19T20:15:08.430 | Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally pr... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
],
"url": "https://github.com/woodpecker-ci/woodpecker-security/issues/10"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/woodpecker-ci/woodpecker/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FFB6F4F-B936-4455-9130-B6BD0EFD9D46",
"versionEndExcluding": "2.7.0",
"versionEndIncluding": null,
"versionSta... | [
"74"
] | 74 | https://github.com/woodpecker-ci/woodpecker/issues/3929 | [
"Patch"
] | github.com | [
"woodpecker-ci",
"woodpecker"
] | > Using a "dangerous" env var like `LD_PRELOAD` could allow to escape the plugins default entrypoint to execute malicious code using privileged permissions of an escalated plugin.
>
> https://stackoverflow.com/questions/426230/what-is-the-ld-preload-trick
_Originally posted by @anbraten in https://github.com/wood... | Getting privileged permissions using a "dangerous" env var with a escalated plugin | https://api.github.com/repos/woodpecker-ci/woodpecker/issues/3929/comments | 7 | 2024-07-18T18:47:53Z | 2024-10-04T13:58:44Z | https://github.com/woodpecker-ci/woodpecker/issues/3929 | 2,417,135,603 | 3,929 | 6,154 |
CVE-2024-6932 | 2024-07-20T22:15:10.190 | A vulnerability was found in ClassCMS 4.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/?action=home&do=shop:index&keyword=&kind=all. The manipulation of the argument order leads to cross site scripting. The attack can be launched remotely. The explo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/42"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271987"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:classcms_project:classcms:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE32DE9-5B81-449F-A6C5-869FB0C110E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/42 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
ClassCMS version 4.5 has a reflected XSS vulnerability that allows attackers to execute any web script or HTML by injecting a carefully crafted payload into the `order` field.
# Details
http://your-ip/admin/?action=home&do=shop:index&keyword=&kind=all&order=%22%3E%3Cscript%3Ealert(document.cookie)%3C/scrip... | ClassCMS v4.5 has a reflected XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/42/comments | 1 | 2024-05-17T07:32:13Z | 2024-07-24T02:48:21Z | https://github.com/Hebing123/cve/issues/42 | 2,302,024,779 | 42 | 6,155 |
CVE-2024-6939 | 2024-07-21T05:15:04.310 | A vulnerability was found in Xinhu RockOA 2.6.3 and classified as problematic. Affected by this issue is the function okla of the file /webmain/public/upload/tpl_upload.html. The manipulation of the argument callback leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rainrocka/xinhu/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.271994"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xinhu:rockoa:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8057234-AE8B-466D-A3E7-B507E509C675",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/rainrocka/xinhu/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rainrocka",
"xinhu"
] | # Summary
A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in Xinhu RockOA v2.6.3, existing in the `Callback` parameter of `/webmain/public/upload/tpl_upload.html`.
# Details
In `/webmain/public/upload/tpl_upload.html`, since the callback variable is directly concatenated into the script tag ... | Reflected XSS Vulnerability in Xinhu RockOA v2.6.3 | https://api.github.com/repos/rainrocka/xinhu/issues/7/comments | 0 | 2024-07-11T06:18:44Z | 2024-07-11T06:20:24Z | https://github.com/rainrocka/xinhu/issues/7 | 2,402,344,676 | 7 | 6,156 |
CVE-2024-6941 | 2024-07-21T06:15:05.550 | A vulnerability, which was classified as problematic, has been found in ThinkSAAS 3.7.0. This issue affects some unknown processing of the file app/system/action/do.php. The manipulation of the argument site_title/site_subtitle/site_key/site_desc/site_url/site_email/site_icp leads to cross site scripting. The attack ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/thinksaas/ThinkSAAS/issues/36"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.272... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinksaas:thinksaas:3.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6E05186E-7A81-4B66-8B49-B69B6B9E8ED2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/thinksaas/ThinkSAAS/issues/36 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"thinksaas",
"ThinkSAAS"
] | # Summary
The ThinkSAAS 3.7.0 application contains a storage XSS vulnerability caused by insufficient sanitization of user input. Specifically, the parameters `site_title`, `site_subtitle`, `site_key`, `site_desc`, `site_url`, `site_email`, and `site_icp` are not properly filtered for malicious code in `app/system/act... | ThinkSAAS 3.7.0 has a storage XSS vulnerability | https://api.github.com/repos/thinksaas/ThinkSAAS/issues/36/comments | 0 | 2024-07-12T06:58:19Z | 2024-07-12T07:12:41Z | https://github.com/thinksaas/ThinkSAAS/issues/36 | 2,404,894,580 | 36 | 6,157 |
CVE-2024-6942 | 2024-07-21T07:15:05.887 | A vulnerability, which was classified as problematic, was found in ThinkSAAS 3.7.0. Affected is an unknown function of the file app/system/action/anti.php of the component Admin Panel Security Center. The manipulation of the argument ip/email/phone leads to cross site scripting. It is possible to launch the attack remo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/thinksaas/ThinkSAAS/issues/37"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.272... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinksaas:thinksaas:3.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6E05186E-7A81-4B66-8B49-B69B6B9E8ED2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/thinksaas/ThinkSAAS/issues/37 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"thinksaas",
"ThinkSAAS"
] | # Summary
ThinkSAAS version 3.7.0 contains multiple stored Cross-Site Scripting (XSS) vulnerabilities.
These vulnerabilities occur due to the lack of proper filtering of input variables in the `app/system/action/anti.php` file. The vulnerabilities are present in various functionalities such as IP filtering, Email fi... | ThinkSAAS 3.7.0 has a storage XSS vulnerability | https://api.github.com/repos/thinksaas/ThinkSAAS/issues/37/comments | 0 | 2024-07-12T07:25:04Z | 2024-07-12T07:26:36Z | https://github.com/thinksaas/ThinkSAAS/issues/37 | 2,404,934,876 | 37 | 6,158 |
CVE-2024-6953 | 2024-07-21T12:15:02.500 | A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. This issue affects some unknown processing of the file sms.php. The manipulation of the argument customer leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and m... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/333-uit/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/333-uit/CVE/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"333-uit",
"CVE"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 sms.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-so... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 sms.php SQL injection | https://api.github.com/repos/333-uit/CVE/issues/1/comments | 0 | 2024-07-18T07:46:26Z | 2024-07-18T07:46:26Z | https://github.com/333-uit/CVE/issues/1 | 2,415,633,245 | 1 | 6,159 |
CVE-2024-6966 | 2024-07-22T03:15:02.310 | A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file login.php of the component Login. The manipulation of the argument user/pass leads to sql injection. The attack may be launched remotely. The exp... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/HermesCui/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.272120"
},
{
"source": "cna@vuld... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"89"
] | 89 | https://github.com/HermesCui/CVE/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"HermesCui",
"CVE"
] | # Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "login.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Blood Bank Management System" in PHP
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/
# AFFECTED AND/... | Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "login.php" SQL injection | https://api.github.com/repos/HermesCui/CVE/issues/1/comments | 0 | 2024-07-21T00:54:16Z | 2024-07-22T07:28:40Z | https://github.com/HermesCui/CVE/issues/1 | 2,421,150,437 | 1 | 6,160 |
CVE-2024-7067 | 2024-07-24T14:15:06.593 | A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization. The attack may be la... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/commit/a02111a674ab49f65018b31da3011b1e396f59b1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:shuttur:ecommerce-laravel-bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B43EF4-9E43-47B2-B8A3-D24AFFA3C0A9",
"versionEndExcluding": "2024-07-03",
"versionEndIncluding": null,
... | [
"502"
] | 502 | https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"kirilkirkov",
"Ecommerce-Laravel-Bootstrap"
] | Dear reader(s),
I have found a vulnerability in the code.
Can you please share the contact details to report a vulnerability I have found or enable the security policy so that I can fill a report?
Awaiting the response and suggested next steps.
Kind Regards,
R.
| Found a Vulnerability in the code | https://api.github.com/repos/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18/comments | 8 | 2024-06-25T15:41:31Z | 2024-07-17T05:39:57Z | https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18 | 2,373,017,859 | 18 | 6,161 |
CVE-2024-7067 | 2024-07-24T14:15:06.593 | A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization. The attack may be la... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/commit/a02111a674ab49f65018b31da3011b1e396f59b1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:shuttur:ecommerce-laravel-bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B43EF4-9E43-47B2-B8A3-D24AFFA3C0A9",
"versionEndExcluding": "2024-07-03",
"versionEndIncluding": null,
... | [
"502"
] | 502 | https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18#issuecomment-2192470359 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"kirilkirkov",
"Ecommerce-Laravel-Bootstrap"
] | Dear reader(s),
I have found a vulnerability in the code.
Can you please share the contact details to report a vulnerability I have found or enable the security policy so that I can fill a report?
Awaiting the response and suggested next steps.
Kind Regards,
R.
| Found a Vulnerability in the code | https://api.github.com/repos/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18/comments | 8 | 2024-06-25T15:41:31Z | 2024-07-17T05:39:57Z | https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18 | 2,373,017,859 | 18 | 6,162 |
CVE-2024-7067 | 2024-07-24T14:15:06.593 | A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization. The attack may be la... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/commit/a02111a674ab49f65018b31da3011b1e396f59b1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:shuttur:ecommerce-laravel-bootstrap:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B43EF4-9E43-47B2-B8A3-D24AFFA3C0A9",
"versionEndExcluding": "2024-07-03",
"versionEndIncluding": null,
... | [
"502"
] | 502 | https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18#issuecomment-2206863135 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"kirilkirkov",
"Ecommerce-Laravel-Bootstrap"
] | Dear reader(s),
I have found a vulnerability in the code.
Can you please share the contact details to report a vulnerability I have found or enable the security policy so that I can fill a report?
Awaiting the response and suggested next steps.
Kind Regards,
R.
| Found a Vulnerability in the code | https://api.github.com/repos/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18/comments | 8 | 2024-06-25T15:41:31Z | 2024-07-17T05:39:57Z | https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18 | 2,373,017,859 | 18 | 6,163 |
CVE-2024-7081 | 2024-07-24T21:15:12.913 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file expcatadd.php. The manipulation of the argument id/title leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zgg012/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tailoring_management_system_project:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5480D1D7-8F9B-4A1F-A973-AFCA69DF4620",
"versionEndExcluding": null,
"versionEndInc... | [
"89"
] | 89 | https://github.com/zgg012/cve/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"zgg012",
"cve"
] |
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expcatadd.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expcatadd.php SQL injection | https://api.github.com/repos/zgg012/cve/issues/1/comments | 0 | 2024-07-24T13:10:45Z | 2024-07-24T13:10:45Z | https://github.com/zgg012/cve/issues/1 | 2,427,552,836 | 1 | 6,164 |
CVE-2024-7161 | 2024-07-28T16:15:02.047 | A vulnerability classified as problematic was found in SeaCMS 13.0. Affected by this vulnerability is an unknown functionality of the file /member.php?action=chgpwdsubmit of the component Password Change Handler. The manipulation of the argument newpwd/newpwd2 leads to cross-site request forgery. The attack can be laun... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/HuaQiPro/seacms/issues/30"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.272575"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seacms:seacms:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E86E61D7-442D-43D0-845F-B7858A4F2B4E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"352"
] | 352 | https://github.com/HuaQiPro/seacms/issues/30 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"HuaQiPro",
"seacms"
] | # Summary
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in SeaCms V13.0. This vulnerability allows an attacker to change a user's password without their consent by tricking them into visiting a malicious webpage.
# POC
```
POST /member.php?action=chgpwdsubmit HTTP/1.1
Host: your-ip
Conte... | CSRF Vulnerability in SeaCms V13.0 | https://api.github.com/repos/HuaQiPro/seacms/issues/30/comments | 1 | 2024-07-08T09:50:23Z | 2024-07-29T02:24:33Z | https://github.com/HuaQiPro/seacms/issues/30 | 2,395,172,359 | 30 | 6,165 |
CVE-2024-7162 | 2024-07-28T16:15:02.347 | A vulnerability, which was classified as problematic, has been found in SeaCMS 12.9/13.0. Affected by this issue is some unknown functionality of the file js/player/dmplayer/admin/post.php?act=setting. The manipulation of the argument yzm leads to cross site scripting. The attack may be launched remotely. The exploit h... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/HuaQiPro/seacms/issues/29"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.2... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/HuaQiPro/seacms/issues/29 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"HuaQiPro",
"seacms"
] | # Summary
SeaCms V12.9 contains multiple stored XSS vulnerabilities originating from insufficient filtering of several configuration variables in data.php related to `$yzm`. These vulnerabilities can be exploited through the `js/player/dmplayer/admin/post.php?act=setting` endpoint, where multiple configuration variabl... | SeaCms V12.9 Multiple Stored XSS Vulnerabilities | https://api.github.com/repos/HuaQiPro/seacms/issues/29/comments | 1 | 2024-07-08T07:47:04Z | 2024-07-29T02:24:53Z | https://github.com/HuaQiPro/seacms/issues/29 | 2,394,902,847 | 29 | 6,166 |
CVE-2024-7163 | 2024-07-28T17:15:09.797 | A vulnerability, which was classified as problematic, was found in SeaCMS 12.9. This affects an unknown part of the file /js/player/dmplayer/player/index.php. The manipulation of the argument color/vid/url leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/HuaQiPro/seacms/issues/28"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.272577"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/HuaQiPro/seacms/issues/28 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"HuaQiPro",
"seacms"
] | # Summary
A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the SeaCms V12.9.
Multiple reflective XSS vulnerabilities were discovered in `\js\player\dmplayer\play\index.php`.
# Details
We discovered that Seacms has very strict policies for front-end functionalities, frequently incorporati... | Reflected XSS Vulnerability in SeaCms V12.9 | https://api.github.com/repos/HuaQiPro/seacms/issues/28/comments | 1 | 2024-07-08T02:30:20Z | 2024-07-29T02:25:08Z | https://github.com/HuaQiPro/seacms/issues/28 | 2,394,462,190 | 28 | 6,167 |
CVE-2024-36572 | 2024-07-30T20:15:03.630 | Prototype pollution in allpro form-manager 0.7.4 allows attackers to run arbitrary code and cause other impacts via the functions setDefaults, mergeBranch, and Object.setObjectValue. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://gist.github.com/mestrtee/1771ab4fba733ca898b6e2463dc6ed19"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/allpro/form-manager/issues/1"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:allpro:formmanager_data_handler:0.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "71E32868-786A-48EE-980B-A775C288255A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | [
"1321"
] | 1321 | https://github.com/allpro/form-manager/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"allpro",
"form-manager"
] | ## Overview
The module is vulenrable via three functions: , located at `setDefaults (form-manager/cjs/index.js:1299)`, `mergeBranch (form-manager/cjs/index.js:1249)`, and `Object.setObjectValue (form-manager/cjs/index.js:1536)` respectively. In all these implementations, the assignment of the property from source ... | Prototype pollution vulnerability affecting form-manager@0.7.4 | https://api.github.com/repos/allpro/form-manager/issues/1/comments | 0 | 2024-03-14T20:10:37Z | 2024-03-14T20:10:57Z | https://github.com/allpro/form-manager/issues/1 | 2,187,184,904 | 1 | 6,168 |
CVE-2024-7303 | 2024-07-31T08:15:02.780 | A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /request.php of the component Send Blood Request Page. The manipulation of the argument Address/bloodgroup leads to cross site scripting. The attack... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/cl4irv0yance/CVEs/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.273185"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"79"
] | 79 | https://github.com/cl4irv0yance/CVEs/issues/1 | [
"Exploit"
] | github.com | [
"cl4irv0yance",
"CVEs"
] | # Stored XSS in Online Blood Bank Management System V1.0
### Affected Product
Online Blood Bank Management System
### Vendor Homepage
[https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/](https://itsourcecode.com/free-projects/php-project/online-... | ItSourceCode 'Online Blood Bank Management System in PHP" Stored XSS | https://api.github.com/repos/cl4irv0yance/CVEs/issues/1/comments | 1 | 2024-07-25T19:35:24Z | 2024-07-31T00:23:27Z | https://github.com/cl4irv0yance/CVEs/issues/1 | 2,430,853,526 | 1 | 6,169 |
CVE-2024-7311 | 2024-07-31T11:15:11.233 | A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file register.php. The manipulation of the argument Email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the publi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/23588hk/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.273203"
},
{
"source": "cna@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:online_bus_reservation_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6370AED9-FA1C-4C5C-94A3-8DC8497337DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/23588hk/cve/issues/1 | [
"Exploit"
] | github.com | [
"23588hk",
"cve"
] | # code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 register.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Bus Reservation Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/online-bus-reservation-system-using-php-source-code/
# AFFECTED AND/OR FIXED V... | code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 register.php SQL injection | https://api.github.com/repos/23588hk/cve/issues/1/comments | 0 | 2024-07-30T13:55:21Z | 2024-07-30T13:55:21Z | https://github.com/23588hk/cve/issues/1 | 2,437,906,687 | 1 | 6,170 |
CVE-2024-7320 | 2024-07-31T11:15:11.527 | A vulnerability classified as critical has been found in itsourcecode Online Blood Bank Management System 1.0. This affects an unknown part of the file /admin/index.php of the component Admin Login. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/cl4irv0yance/CVEs/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.273231"
},
{
"source": "cna@vuldb.com",
"tags": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"89"
] | 89 | https://github.com/cl4irv0yance/CVEs/issues/3 | [
"Exploit"
] | github.com | [
"cl4irv0yance",
"CVEs"
] | ## Itsourcecode Online Blood Bank Management Authentication Bypass via SQL Injection to User page and Admin Console
### Affected Product
Online Blood Bank Management System in PHP with Source Code
### Vendor Homepage
[https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-p... | Itsourcecode Online Blood Bank Management Authentication Bypass via SQL Injection to User page and Admin Console | https://api.github.com/repos/cl4irv0yance/CVEs/issues/3/comments | 0 | 2024-07-30T21:22:05Z | 2024-07-31T15:28:09Z | https://github.com/cl4irv0yance/CVEs/issues/3 | 2,438,703,901 | 3 | 6,171 |
CVE-2024-7321 | 2024-07-31T12:15:02.027 | A vulnerability classified as problematic was found in itsourcecode Online Blood Bank Management System 1.0. This vulnerability affects unknown code of the file signup.php of the component User Registration Handler. The manipulation of the argument user leads to cross site scripting. The attack can be initiated remotel... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/cl4irv0yance/CVEs/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.273232"
},
{
"source": "cna@vuldb.com",
"tags": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"79"
] | 79 | https://github.com/cl4irv0yance/CVEs/issues/4 | [
"Exploit"
] | github.com | [
"cl4irv0yance",
"CVEs"
] | # Stored XSS in Online Blood Bank Management System V1.0
### Affected Product
Online Blood Bank Management System
### Vendor Homepage
[https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/](https://itsourcecode.com/free-projects/php-project/online-... | ItSourceCode Stored XSS via User Registration | https://api.github.com/repos/cl4irv0yance/CVEs/issues/4/comments | 0 | 2024-07-30T22:46:00Z | 2024-07-30T22:46:01Z | https://github.com/cl4irv0yance/CVEs/issues/4 | 2,438,794,683 | 4 | 6,172 |
CVE-2024-7342 | 2024-08-01T05:15:10.303 | A vulnerability was found in Baidu UEditor 1.4.3.3. It has been classified as problematic. This affects an unknown part of the file /ueditor/php/controller.php?action=uploadfile&encode=utf-8. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/62"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.273... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:baidu:ueditor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5D0ADE2-CF30-42AB-8F6D-D5FAE3724C5B",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.3.3",
"versionStartExcludi... | [
"434"
] | 434 | https://github.com/Hebing123/cve/issues/62 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A stored cross-site scripting (XSS) vulnerability has been identified in UEditor version 1.4.3.3.
The vulnerability stems from the default configuration of config.json files within the ≤1.4.3.3 versions of UEditor, which permits the uploading of `.swf` files. Furthermore, for versions ≥1.4.2 and ≤1.4.3.3, ... | Stored Cross-Site Scripting (XSS) Vulnerability in UEditor 1.4.3.3 | https://api.github.com/repos/Hebing123/cve/issues/62/comments | 1 | 2024-07-25T08:44:45Z | 2024-08-01T08:21:13Z | https://github.com/Hebing123/cve/issues/62 | 2,429,393,116 | 62 | 6,173 |
CVE-2024-7343 | 2024-08-01T05:15:10.573 | A vulnerability was found in Baidu UEditor 1.4.2. It has been declared as problematic. This vulnerability affects unknown code of the file /ueditor142/php/controller.php?action=catchimage. The manipulation of the argument source[] leads to cross site scripting. The attack can be initiated remotely. The exploit has been... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/63"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.273... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:baidu:ueditor:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4283664F-A0E6-4ADD-B69A-CDD8B0190807",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/63 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A reflected cross-site scripting (XSS) vulnerability has been identified in the UEditor 1.4.2. This vulnerability permits an attacker to inject malicious scripts into web pages viewed by users, potentially compromising user data and session integrity.
# Details
The vulnerability exists in the `/ueditor/php... | Reflected XSS Vulnerability in UEditor 1.4.2 | https://api.github.com/repos/Hebing123/cve/issues/63/comments | 1 | 2024-07-25T11:45:34Z | 2024-08-01T08:21:02Z | https://github.com/Hebing123/cve/issues/63 | 2,429,755,671 | 63 | 6,174 |
CVE-2024-7453 | 2024-08-04T05:16:09.523 | A vulnerability was found in FastAdmin 1.5.0.20240328. It has been declared as problematic. This vulnerability affects unknown code of the file /[admins_url].php/general/attachment/edit/ids/4?dialog=1 of the component Attachment Management Section. The manipulation of the argument row[url]/row[imagewidth]/row[imageheig... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/65"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/6... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fastadmin:fastadmin:1.5.0.20240328:*:*:*:*:*:*:*",
"matchCriteriaId": "C48F655F-EFFC-4DAE-88D9-BEABE6CD3EF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/65 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
> FastAdmin is a lightweight and efficient management background framework based on ThinkPHP. It is widely used for its simplicity and powerful features.
FastAdmin 1.5.0.20240328, a version of the FastAdmin framework, contains a stored cross-site scripting (XSS) vulnerability in the backend's General M... | FastAdmin 1.5.0.20240328 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/65/comments | 1 | 2024-08-01T08:27:51Z | 2024-08-05T07:00:20Z | https://github.com/Hebing123/cve/issues/65 | 2,441,815,665 | 65 | 6,175 |
CVE-2024-7453 | 2024-08-04T05:16:09.523 | A vulnerability was found in FastAdmin 1.5.0.20240328. It has been declared as problematic. This vulnerability affects unknown code of the file /[admins_url].php/general/attachment/edit/ids/4?dialog=1 of the component Attachment Management Section. The manipulation of the argument row[url]/row[imagewidth]/row[imageheig... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/65"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/6... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fastadmin:fastadmin:1.5.0.20240328:*:*:*:*:*:*:*",
"matchCriteriaId": "C48F655F-EFFC-4DAE-88D9-BEABE6CD3EF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/66 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
> FastAdmin is a PHP backend development framework that is open-source under the Apache 2.0 license. It is designed for rapid development of backend systems, featuring a permission management system based on Auth verification, and offers a one-click generation of CRUD (Create, Read, Update, Delete) functiona... | FastAdmin 1.5.0.20240328 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/66/comments | 1 | 2024-08-01T08:43:35Z | 2024-08-05T07:00:31Z | https://github.com/Hebing123/cve/issues/66 | 2,441,849,243 | 66 | 6,176 |
CVE-2024-7455 | 2024-08-04T12:16:01.240 | A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. This affects an unknown part of the file partedit.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/Wumshi/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuld... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system_project_in_php:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BFACB1B0-0CF6-449D-84F4-1836B7BF6056",
"versionEndExcluding": null,
"versionEndIncludin... | [
"89"
] | 89 | https://github.com/Wumshi/cve/issues/3 | [
"Exploit",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"Wumshi",
"cve"
] |
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 partedit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-ph... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 partedit.php SQL injection | https://api.github.com/repos/Wumshi/cve/issues/3/comments | 0 | 2024-08-03T15:45:51Z | 2024-08-03T15:45:51Z | https://github.com/Wumshi/cve/issues/3 | 2,446,426,386 | 3 | 6,177 |
CVE-2024-7458 | 2024-08-04T22:15:50.837 | A vulnerability was found in elunez eladmin up to 2.7 and classified as critical. This issue affects some unknown processing of the file /api/deploy/upload /api/database/upload of the component Database Management/Deployment Management. The manipulation of the argument file leads to path traversal: 'dir/../../filename'... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.2,
"confidentialityImpact... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/elunez/eladmin/issues/851"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eladmin:eladmin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C479E81-58DB-4E78-9175-C23E9FEEB7D3",
"versionEndExcluding": null,
"versionEndIncluding": "2.7",
"versionStartExcluding... | [
"22"
] | 22 | https://github.com/elunez/eladmin/issues/851 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"elunez",
"eladmin"
] | ### **Description**
Eladmin is a back-end management system with front-end and back-end separation based on Spring Boot 2.6.4, Spring Boot Jpa, JWT, Spring Security, Redis, and Vue
Eladmin v2.7 has an arbitrary file upload vulnerability in the Database management and Deployment management
Attackers can constru... | There exists an arbitrary file upload and delete vulnerability in the Database management and Deployment management | https://api.github.com/repos/elunez/eladmin/issues/851/comments | 0 | 2024-07-26T03:08:57Z | 2025-01-15T02:30:46Z | https://github.com/elunez/eladmin/issues/851 | 2,431,322,064 | 851 | 6,178 |
CVE-2024-7505 | 2024-08-06T04:16:47.857 | A vulnerability, which was classified as critical, was found in itsourcecode Bike Delivery System 1.0. Affected is an unknown function of the file contact_us_action.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/56"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rainniar:bike_delivery_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD21579-B575-4D3A-BDEB-B936103B4902",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"89"
] | 89 | https://github.com/CveSecLook/cve/issues/56 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Itsourcecode Bike Delivery System Source code Sample 1.0 contact_us_action.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bike Delivery System Source code Sample
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/bike-delivery-system-source-code-sample/
# AFFECTED AND/OR FIXED VERSION(S)
... | Itsourcecode Bike Delivery System Source code Sample 1.0 contact_us_action.php SQL injection | https://api.github.com/repos/CveSecLook/cve/issues/56/comments | 0 | 2024-08-05T11:25:18Z | 2024-08-05T11:25:18Z | https://github.com/CveSecLook/cve/issues/56 | 2,448,310,157 | 56 | 6,179 |
CVE-2024-7506 | 2024-08-06T05:15:41.413 | A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /setlogo.php. The manipulation of the argument bgimg leads to unrestricted upload. The attack can be launched remotely. The exploit has been d... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CveSecLook/cve/issues/57"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"434"
] | 434 | https://github.com/CveSecLook/cve/issues/57 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CveSecLook",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code setlogo.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source... | Itsourcecode Tailoring Management System Project In PHP With Source Code setlogo.php Unrestricted Upload | https://api.github.com/repos/CveSecLook/cve/issues/57/comments | 0 | 2024-08-05T15:36:19Z | 2024-08-05T15:36:19Z | https://github.com/CveSecLook/cve/issues/57 | 2,448,862,703 | 57 | 6,180 |
CVE-2024-42222 | 2024-08-07T08:16:12.473 | In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data.
Affected users ar... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
],
"url": "https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3"
},
{
"source": "security@apache.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:cloudstack:4.19.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F28C1387-130B-4479-BE47-3CEBC3E92C5B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"200"
] | 200 | https://github.com/apache/cloudstack/issues/9456 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"apache",
"cloudstack"
] | <!--
Verify first that your issue/request is not already reported on GitHub.
Also test if the latest release and main branch are affected too.
Always add information AFTER of these HTML comments, but no need to delete the comments.
-->
##### ISSUE TYPE
<!-- Pick one below and delete the rest -->
* Bug Report
... | ACS 4.19.1 | Full Network List visible for Domain Admin | https://api.github.com/repos/apache/cloudstack/issues/9456/comments | 6 | 2024-07-26T11:06:04Z | 2024-08-22T06:26:20Z | https://github.com/apache/cloudstack/issues/9456 | 2,431,997,510 | 9,456 | 6,181 |
CVE-2024-7635 | 2024-08-12T13:38:45.753 | A vulnerability was found in code-projects Simple Ticket Booking 1.0. It has been classified as critical. Affected is an unknown function of the file register_insert.php of the component Registration Handler. The manipulation of the argument name/email/dob/password/Gender/phone leads to sql injection. It is possible to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/space-security/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:simple_ticket_booking:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D14B5958-44A0-40EB-A3EC-02065AFD7652",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/space-security/cve/issues/2 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"space-security",
"cve"
] | # code-projects Simple Ticket Booking In PHP With Source Code v1.0 register_insert.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Simple Ticket Booking In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/ticket-booking-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
... | code-projects Simple Ticket Booking In PHP With Source Code v1.0 register_insert.php SQL injection | https://api.github.com/repos/space-security/cve/issues/2/comments | 0 | 2024-08-06T12:33:38Z | 2024-08-29T13:27:10Z | https://github.com/space-security/cve/issues/2 | 2,450,774,087 | 2 | 6,182 |
CVE-2024-7636 | 2024-08-12T13:38:46.037 | A vulnerability was found in code-projects Simple Ticket Booking 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file authenticate.php of the component Login. The manipulation of the argument email/password leads to sql injection. The attack can be launched remot... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/space-security/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.274057"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code-projects:simple_ticket_booking:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D14B5958-44A0-40EB-A3EC-02065AFD7652",
"versionEndExcluding": null,
"versionEndIncluding": null,
"... | [
"89"
] | 89 | https://github.com/space-security/cve/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"space-security",
"cve"
] | # code-projects Simple Ticket Booking In PHP With Source Code v1.0 authenticate.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Simple Ticket Booking In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/ticket-booking-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ ... | code-projects Simple Ticket Booking In PHP With Source Code v1.0 authenticate.php SQL injection | https://api.github.com/repos/space-security/cve/issues/1/comments | 0 | 2024-07-14T09:16:55Z | 2024-08-29T13:28:10Z | https://github.com/space-security/cve/issues/1 | 2,407,343,173 | 1 | 6,183 |
CVE-2024-7637 | 2024-08-12T13:38:46.327 | A vulnerability was found in code-projects Online Polling 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file registeracc.php of the component Registration. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit ha... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/space-security/cve/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.274058"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:online_polling:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4FF5D3-052E-4466-91FE-FF9418D00338",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"89"
] | 89 | https://github.com/space-security/cve/issues/3 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"space-security",
"cve"
] | # code-projects Online Polling Using PHP With Source Code v1.0 registeracc.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Polling Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/online-polling-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Liu Mingxua... | code-projects Online Polling Using PHP With Source Code v1.0 registeracc.php SQL injection | https://api.github.com/repos/space-security/cve/issues/3/comments | 0 | 2024-08-07T02:19:13Z | 2024-08-29T13:25:48Z | https://github.com/space-security/cve/issues/3 | 2,452,069,911 | 3 | 6,184 |
CVE-2024-7680 | 2024-08-12T13:38:55.060 | A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /incedit.php?id=4. The manipulation of the argument id/inccat/desc/date/amount leads to sql injection. It is possible to initiate the attack remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/chenzg22/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/chenzg22/cve/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"chenzg22",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 incedit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-wit... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 incedit.php SQL injection | https://api.github.com/repos/matias-a11y/cve/issues/1/comments | 0 | 2024-08-11T07:14:33Z | 2024-08-11T07:14:33Z | https://github.com/matias-a11y/cve/issues/1 | 2,459,461,351 | 1 | 6,185 |
CVE-2024-7681 | 2024-08-12T13:38:55.480 | A vulnerability was found in code-projects College Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument email/password leads to sql injection. The attack can be initiated remotely. The exploit... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/space-security/cve/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:college_management_system_project:college_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADB4C9F-1230-4F3E-9E79-15F80FE25866",
"versionEndExcluding": null,
"versionEndIncludi... | [
"89"
] | 89 | https://github.com/space-security/cve/issues/6 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"space-security",
"cve"
] | # code-projects College Management System In PHP With Source Code v1.0 login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ College Management System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/college-management-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## s... | code-projects College Management System In PHP With Source Code v1.0 login.php SQL injection | https://api.github.com/repos/space-security/cve/issues/6/comments | 0 | 2024-08-11T13:51:52Z | 2024-08-29T13:21:16Z | https://github.com/space-security/cve/issues/6 | 2,459,603,423 | 6 | 6,186 |
CVE-2024-7682 | 2024-08-12T13:38:55.913 | A vulnerability was found in code-projects Job Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file rw_i_nat.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/space-security/cve/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vul... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43FB0433-4530-4F0A-A88F-B017F5DD72F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/space-security/cve/issues/7 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"space-security",
"cve"
] | # code-projects Job Portal Using PHP With Source Code v1.0 rw_i_nat.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Job Portal Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/job-portal-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ Liu Mingxuan, Liu Hang
##... | code-projects Job Portal Using PHP With Source Code v1.0 rw_i_nat.php SQL injection | https://api.github.com/repos/space-security/cve/issues/7/comments | 0 | 2024-08-11T13:58:35Z | 2024-08-29T13:13:43Z | https://github.com/space-security/cve/issues/7 | 2,459,605,800 | 7 | 6,187 |
CVE-2024-21550 | 2024-08-12T15:15:19.903 | SteVe is an open platform that implements different version of the OCPP protocol for Electric Vehicle charge points, acting as a central server for management of registered charge points. Attackers can inject arbitrary HTML and Javascript code via WebSockets leading to persistent Cross-Site Scripting in the SteVe manag... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "report@snyk.io",
"tags": [
"Product"
],
"url": "https://github.com/steve-community/steve/blob/steve-3.6.0/src/main/java/de/rwth/idsg/steve/config/WebSocketConfiguration.java#L69"
},
{
"source": "report@snyk.io",
"tags": [
"Patch"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:steve-community:steve:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3142CE-5549-4BED-8B4C-01ECF77B9E0F",
"versionEndExcluding": null,
"versionEndIncluding": "3.5.1",
"versionStartE... | [
"79"
] | 79 | https://github.com/steve-community/steve/issues/1526 | [
"Issue Tracking",
"Patch"
] | github.com | [
"steve-community",
"steve"
] | #### Checklist
- [x] I checked other issues already, but found no answer/solution
- [x] I checked the documentation and wiki, but found no answer/solution
- [x] I am running the latest version and the issue still occurs
- [x] I am sure that this issue is about SteVe (and not about the charging station software or... | Validate chargeBoxId for WS connections | https://api.github.com/repos/steve-community/steve/issues/1526/comments | 4 | 2024-08-01T16:55:48Z | 2024-08-04T08:54:25Z | https://github.com/steve-community/steve/issues/1526 | 2,442,929,562 | 1,526 | 6,188 |
CVE-2024-7794 | 2024-08-14T21:15:17.817 | A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file mybill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ppp-src/ha/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.274562"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adrianmercurio:vehicle_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01988E3D-47DA-45BA-97FC-E6EDD88177DB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/ha/issues/5 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ppp-src",
"ha"
] | # Itsourcecode Vehicle Management System Project in PHP 1.0 mybill.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Vehicle Management System Project in PHP Free Download
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/vehicle-management-system-project-in-php-free-download/
# AFFECTED AND... | Itsourcecode Vehicle Management System Project in PHP 1.0 mybill.php SQL injection | https://api.github.com/repos/ppp-src/ha/issues/5/comments | 0 | 2024-08-13T02:18:38Z | 2024-08-13T02:18:38Z | https://github.com/ppp-src/ha/issues/5 | 2,462,232,866 | 5 | 6,189 |
CVE-2024-7808 | 2024-08-15T01:15:12.150 | A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file logindbc.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be us... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/XYgit-99/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.274704"
},
{
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43FB0433-4530-4F0A-A88F-B017F5DD72F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/XYgit-99/cve/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"XYgit-99",
"cve"
] | # code-projects Job Portal Using PHP With Source Code v1.0 logindbc.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Job Portal Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/job-portal-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ carbonCircle
## Vulnerabl... | code-projects Job Portal Using PHP With Source Code v1.0 logindbc.php SQL injection | https://api.github.com/repos/XYgit-99/cve/issues/1/comments | 0 | 2024-08-13T15:10:41Z | 2024-08-13T15:10:41Z | https://github.com/XYgit-99/cve/issues/1 | 2,463,597,537 | 1 | 6,190 |
CVE-2024-42681 | 2024-08-15T17:15:18.303 | Insecure Permissions vulnerability in xxl-job v.2.4.1 allows a remote attacker to execute arbitrary code via the Sub-Task ID component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3516"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C90A77A0-C0DF-4EEB-AB59-EFAEBCFFE60B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"276"
] | 276 | https://github.com/xuxueli/xxl-job/issues/3516 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"xuxueli",
"xxl-job"
] | XXL-JOB Version: 2.4.1
Expected Behavior:
Users should only be able to see and execute tasks on the executors they are assigned to.
Ordinary users should not be able to see or execute tasks on executors they are not assigned to.
Actual Behavior:
In version 2.4.1, even though an ordinary user is not assigned to... | XXL-JOB 2.4.1 Permission Issue: Ordinary Users Can Indirectly Execute Tasks of Unassigned Executors via Sub-Task IDs | https://api.github.com/repos/xuxueli/xxl-job/issues/3516/comments | 1 | 2024-07-23T03:09:28Z | 2024-11-10T11:33:28Z | https://github.com/xuxueli/xxl-job/issues/3516 | 2,424,146,540 | 3,516 | 6,191 |
CVE-2024-42843 | 2024-08-15T17:15:18.400 | Projectworlds Online Examination System v1.0 is vulnerable to SQL Injection via the subject parameter in feed.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ganzhi-qcy/cve/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectworlds:online_examination_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32029B59-C9C3-4474-8BF6-D5A0410EB748",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ganzhi-qcy/cve/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ganzhi-qcy",
"cve"
] | # projectworlds Online Examination System Project in Php v1.0 feed.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Examination System Project in Php
## Vendor Homepage
+ https://projectworlds.in/free-projects/php-projects/online-examination/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ quchunyi,yaomingjun... | projectworlds Online Examination System Project in Php v1.0 feed.php SQL injection | https://api.github.com/repos/ganzhi-qcy/cve/issues/6/comments | 0 | 2024-07-26T13:36:37Z | 2025-03-06T01:28:07Z | https://github.com/ganzhi-qcy/cve/issues/6 | 2,432,260,063 | 6 | 6,192 |
CVE-2024-7838 | 2024-08-15T20:15:18.457 | A vulnerability was found in itsourcecode Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /addcategory.php. The manipulation of the argument cname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ppp-src/a/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.274742"
},
{
"sou... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6AA4AA-216E-471B-9107-65E50C880042",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ppp-src",
"a"
] | # Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "category.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Online Food Ordering System Project in PHP with Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/
# AFFECTED AND/... | Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "category.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/1/comments | 0 | 2024-08-15T00:21:11Z | 2024-08-15T00:21:11Z | https://github.com/ppp-src/a/issues/1 | 2,467,031,541 | 1 | 6,193 |
CVE-2024-7839 | 2024-08-15T21:15:18.237 | A vulnerability classified as critical has been found in itsourcecode Billing System 1.0. This affects an unknown part of the file addbill.php. The manipulation of the argument owners_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/ppp-src/a/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.274743"
},
{
"source": "cna@vuldb.com",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:billing_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6AB542E-F5A5-4637-8D8D-E45F0ED68384",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/2 | [
"Exploit"
] | github.com | [
"ppp-src",
"a"
] | # Itsourcecode "Billing System" in PHP 1.0 "addbill.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Billing System In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ wudongG
... | Itsourcecode "Billing System" in PHP 1.0 "addbill.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/2/comments | 0 | 2024-08-15T00:36:04Z | 2024-08-15T00:36:04Z | https://github.com/ppp-src/a/issues/2 | 2,467,055,446 | 2 | 6,194 |
CVE-2024-7913 | 2024-08-18T22:15:12.480 | A vulnerability was found in itsourcecode Billing System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /addclient1.php. The manipulation of the argument lname/fname/mi/address/contact/meterReader leads to sql injection. The attack may be initiated remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ppp-src/a/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.275039"
},
{
"sou... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:billing_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6AB542E-F5A5-4637-8D8D-E45F0ED68384",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/ppp-src/a/issues/4 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ppp-src",
"a"
] | # Itsourcecode "Billing System " in PHP 1.0 "addclient1.php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Billing System In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xxxx
... | Itsourcecode "Billing System " in PHP 1.0 "addclient1.php" SQL injection | https://api.github.com/repos/ppp-src/a/issues/4/comments | 0 | 2024-08-15T15:03:58Z | 2024-08-15T15:03:58Z | https://github.com/ppp-src/a/issues/4 | 2,468,258,395 | 4 | 6,195 |
CVE-2024-44076 | 2024-08-19T03:15:03.883 | In Microcks before 1.10.0, the POST /api/import and POST /api/export endpoints allow non-administrator access. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/microcks/microcks/compare/1.9.1-fix-1...1.10.0"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/microcks/microcks/issues/1212... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microcks:microcks:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B7DBDB-CA72-4351-A85C-47EBEB5D0AE5",
"versionEndExcluding": "1.10.0",
"versionEndIncluding": null,
"versionStartExcl... | [
"269"
] | 269 | https://github.com/microcks/microcks/issues/1212 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"microcks",
"microcks"
] | ### Describe the bug
The `POST /api/import` and `POST /api/export` endpoints should be secured and allowed to administrator only.
### Expected behavior
When calling the API in unauthenticated mode or with a token corresponding to a manager role, we should receive an error `401`
### Actual behavior
The API call are... | Snapshot import and export endpoints are unsecured | https://api.github.com/repos/microcks/microcks/issues/1212/comments | 0 | 2024-06-14T12:20:03Z | 2024-06-14T14:00:54Z | https://github.com/microcks/microcks/issues/1212 | 2,353,253,534 | 1,212 | 6,196 |
CVE-2024-43380 | 2024-08-19T15:15:08.893 | fugit contains time tools for flor and the floraison group. The fugit "natural" parser, that turns "every wednesday at 5pm" into "0 17 * * 3", accepted any length of input and went on attempting to parse it, not returning promptly, as expected. The parse call could hold the thread with no end in sight. Fugit dependents... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integ... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/floraison/fugit/commit/ad2c1c9c737213d585fff0b51c927d178b2c05a5"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:floraison:fugit:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "7FA5151C-7CD2-4FC9-B141-F5BF715E5592",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionStartExc... | [
"400"
] | 400 | https://github.com/floraison/fugit/issues/104 | [
"Issue Tracking",
"Patch"
] | github.com | [
"floraison",
"fugit"
] |
## Issue description
Hi!
I fuzzed this library with afl and found that the program hangs with a crafted input. I originally reported this privately, but it was later decided to create a public issue. I am going to paste my email text here:
> Hi!
>
> I decided to report this to you privately, because this... | Poor time complexity of Cron.parse | https://api.github.com/repos/floraison/fugit/issues/104/comments | 3 | 2024-08-14T07:15:05Z | 2024-08-16T01:09:39Z | https://github.com/floraison/fugit/issues/104 | 2,465,079,224 | 104 | 6,197 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.