cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2024-6113
2024-06-20T06:15:10.310
A vulnerability was found in itsourcecode Monbela Tourist Inn Online Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The identifier VDB-268865 was...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wangyuan-ui/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:janobe:monbela_tourist_inn_online_reservation_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E689E6B3-30E9-405A-A3AB-A5597F84A664", "versionEndExcluding": null, "versionEndIncluding": nu...
[ "89" ]
89
https://github.com/wangyuan-ui/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wangyuan-ui", "CVE" ]
# Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Monbela Tourist In Online Reservation System Using PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/monbela-tourist-inn-online-reservation-system/ # AFFECTED ...
Itsourcecode Monbela Tourist In Online Reservation System Using PHP 1.0 login.php SQL injection
https://api.github.com/repos/wangyuan-ui/CVE/issues/3/comments
0
2024-06-18T04:42:44Z
2024-06-18T04:42:44Z
https://github.com/wangyuan-ui/CVE/issues/3
2,358,884,062
3
6,098
CVE-2024-6190
2024-06-20T15:15:50.940
A vulnerability was found in itsourcecode Farm Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/HryspaHodor/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.269162" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/2
[ "Exploit" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode Farm Management System In PHP With Source Code v1.0 index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Farm Management System In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED ...
Itsourcecode Farm Management System In PHP With Source Code v1.0 index.php SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/2/comments
0
2024-06-18T05:38:13Z
2024-06-18T05:38:13Z
https://github.com/HryspaHodor/CVE/issues/2
2,358,954,914
2
6,099
CVE-2024-6191
2024-06-20T15:15:51.230
A vulnerability classified as critical has been found in itsourcecode Student Management System 1.0. This affects an unknown part of the file login.php of the component Login Page. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HryspaHodor/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.269163" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:student_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7816C1E9-D65F-4652-A2F5-27FDEAA6B33D", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode "Student Management System " in PHP 1.0 "login.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Student Management System In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/student-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSI...
Itsourcecode "Student Management System " in PHP 1.0 "login.php" SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/3/comments
0
2024-06-18T05:51:27Z
2024-06-18T05:51:27Z
https://github.com/HryspaHodor/CVE/issues/3
2,358,970,853
3
6,100
CVE-2024-6192
2024-06-20T15:15:51.517
A vulnerability classified as critical was found in itsourcecode Loan Management System 1.0. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HryspaHodor/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.269164" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:loan_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "250E4057-0CA7-43C6-8B0E-D37FEF3D3CF2", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode "Loan Management System Project " in PHP 1.0 "login.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Loan Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/student-management-system-in-php-with-source-code/ # AFFECTED AND/OR ...
# Itsourcecode "Loan Management System Project " in PHP 1.0 "login.php" SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/4/comments
0
2024-06-18T05:57:17Z
2024-06-18T05:57:17Z
https://github.com/HryspaHodor/CVE/issues/4
2,358,978,656
4
6,101
CVE-2024-6193
2024-06-20T16:15:15.110
A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. This issue affects some unknown processing of the file driverprofile.php. The manipulation of the argument driverid leads to sql injection. The attack may be initiated remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/HryspaHodor/CVE/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:vehicle_management_system_project_in_php_and_mysql_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A78DEBCC-775E-4584-81CA-8C3C1DD16C4C", "versionEndExcluding": null, ...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/5
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode Vehicle Management System Project in PHP 1.0 driverprofile.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System Project in PHP Free Download ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/vehicle-management-system-project-in-php-free-download/ # AFFEC...
Itsourcecode Vehicle Management System Project in PHP 1.0 driverprofile.php SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/5/comments
0
2024-06-18T06:01:51Z
2024-06-18T06:01:51Z
https://github.com/HryspaHodor/CVE/issues/5
2,358,984,521
5
6,102
CVE-2024-6194
2024-06-20T16:15:15.393
A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file editmeasurement.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/HryspaHodor/CVE/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:tailoring_management_system_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "22AA317A-3C61-4F74-BB73-80E1247BCA62", "versionEndExcluding": null, "versionEndIn...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/6
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 editmeasurement.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 editmeasurement.php SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/6/comments
0
2024-06-18T06:06:04Z
2024-06-18T06:06:05Z
https://github.com/HryspaHodor/CVE/issues/6
2,358,990,403
6
6,103
CVE-2024-6195
2024-06-20T16:15:15.680
A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file orderadd.php. The manipulation of the argument customer leads to sql injection. The attack can be launched remotely. The exploit has been disc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/2768210355/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:tailoring_management_system_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "22AA317A-3C61-4F74-BB73-80E1247BCA62", "versionEndExcluding": null, "versionEndIn...
[ "89" ]
89
https://github.com/2768210355/cve/issues/2
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "2768210355", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 orderadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-wi...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 orderadd.php SQL injection
https://api.github.com/repos/2768210355/cve/issues/2/comments
0
2024-06-18T13:16:52Z
2024-06-18T13:16:52Z
https://github.com/2768210355/cve/issues/2
2,359,846,319
2
6,104
CVE-2024-6196
2024-06-20T16:15:15.967
A vulnerability was found in itsourcecode Banking Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/2768210355/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:banking_management_system_project_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CCE1617-AD47-4BC0-B29F-2DE2AC771A5E", "versionEndExcluding": null, "versionEndIncluding": n...
[ "89" ]
89
https://github.com/2768210355/cve/issues/1
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "2768210355", "cve" ]
# Itsourcecode Banking Management System Project In PHP v1.0 admin_class.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Banking Management System Project In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/banking-management-system-project-in-php-free-download/ # AFFECTED AND/OR FIXED...
Itsourcecode Banking Management System Project In PHP v1.0 admin_class.php SQL injection
https://api.github.com/repos/2768210355/cve/issues/1/comments
0
2024-06-18T13:13:23Z
2024-06-18T13:13:23Z
https://github.com/2768210355/cve/issues/1
2,359,838,710
1
6,105
CVE-2024-6218
2024-06-21T02:15:13.090
A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. Affected by this issue is some unknown functionality of the file busprofile.php. The manipulation of the argument busid leads to sql injection. The attack may be launched remotely. The exploit has been discl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HryspaHodor/CVE/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.26...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adrianmercurio:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "01988E3D-47DA-45BA-97FC-E6EDD88177DB", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/HryspaHodor/CVE/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "HryspaHodor", "CVE" ]
# Itsourcecode Vehicle Management System Project in PHP 1.0 busprofile.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System Project in PHP Free Download ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/vehicle-management-system-project-in-php-free-download/ # AFFECTED...
Itsourcecode Vehicle Management System Project in PHP 1.0 busprofile.php SQL injection
https://api.github.com/repos/HryspaHodor/CVE/issues/7/comments
0
2024-06-20T06:07:24Z
2024-06-20T06:07:24Z
https://github.com/HryspaHodor/CVE/issues/7
2,363,597,038
7
6,106
CVE-2024-6253
2024-06-22T14:15:09.673
A vulnerability was found in itsourcecode Online Food Ordering System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /purchase.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Desenchanted/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.269420"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E6AA4AA-216E-471B-9107-65E50C880042", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Desenchanted/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Desenchanted", "cve" ]
# Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "order.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Food Ordering System Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/ # AFFECTED AND/OR F...
Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "order.php" SQL injection
https://api.github.com/repos/WhisperingNeon/cve/issues/1/comments
0
2024-06-21T08:49:38Z
2024-06-21T08:54:22Z
https://github.com/WhisperingNeon/cve/issues/1
2,366,052,198
1
6,107
CVE-2024-6268
2024-06-23T10:15:09.753
A vulnerability, which was classified as critical, has been found in lahirudanushka School Management System 1.0.0/1.0.1. Affected by this issue is some unknown functionality of the file login.php of the component Login Page. The manipulation of the argument email leads to sql injection. The attack may be launched remo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/lahirudanushka/School-Management-System---PHP-MySQL/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://powerful-bulb-c36.n...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lahirudanushka:school_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2EA5C3F4-40FB-403D-8E42-D5A2C34C42C3", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/lahirudanushka/School-Management-System---PHP-MySQL/issues/2
[ "Issue Tracking" ]
github.com
[ "lahirudanushka", "School-Management-System---PHP-MySQL" ]
SQL injection in School Management System 1.0 allows remote attackers > to modify or delete data, causing persistent changes to the > application's content or behavior by using malicious SQL queries. > [Vulnerability Type] > SQL Injection > [Affected Component] > http://localhost/login.php
SQLi in version 1
https://api.github.com/repos/lahirudanushka/School-Management-System---PHP-MySQL/issues/2/comments
1
2022-12-07T12:08:13Z
2023-06-23T04:51:43Z
https://github.com/lahirudanushka/School-Management-System---PHP-MySQL/issues/2
1,481,760,784
2
6,108
CVE-2024-4748
2024-06-24T14:15:13.030
The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server.  The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malici...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cvd@cert.pl", "tags": [ "Third Party Advisory" ], "url": "https://cert.pl/en/posts/2024/06/CVE-2024-4748" }, { "source": "cvd@cert.pl", "tags": [ "Third Party Advisory" ], "url": "https://cert.pl/posts/2024/06/CVE-2024-4748" }, { "source": "cvd@ce...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:j11g:cruddiy:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5908333-F478-4071-A90D-BEC428110174", "versionEndExcluding": null, "versionEndIncluding": "202312.1", "versionStartExcludi...
[ "78" ]
78
https://github.com/jan-vandenberg/cruddiy/issues/67
[ "Issue Tracking" ]
github.com
[ "jan-vandenberg", "cruddiy" ]
Hello, CERT PL found a security vulnerability in this repository. How can we report this privately? We don't see any security policy describing how such vulnerabilities should be reported.
Security vulnerability disclosure
https://api.github.com/repos/jan-vandenberg/cruddiy/issues/67/comments
6
2023-11-21T11:21:15Z
2024-04-16T13:27:55Z
https://github.com/jan-vandenberg/cruddiy/issues/67
2,004,054,193
67
6,109
CVE-2024-37677
2024-06-24T19:15:15.527
An issue in Shenzhen Weitillage Industrial Co., Ltd the access management specialist V6.62.51215 allows a remote attacker to obtain sensitive information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dabaizhizhu/123/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dabaizhizh...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:access_management_specialist_project:access_management_specialist:6.62.51215:*:*:*:*:*:*:*", "matchCriteriaId": "5551F46C-46C5-4CA4-A02E-AEEBF3A5CFE4", "versionEndExcluding": null, "vers...
[ "284" ]
284
https://github.com/dabaizhizhu/123/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "dabaizhizhu", "123" ]
Discovered as the access management specialist(门禁专家),and this type of vulnerability can be used to kill all vulnerabilities, and other products can be searched on FOFA:title="门禁专家",This vulnerability impresses nearly 6,000 IPs <img width="775" alt="屏幕截图 2024-05-31 215047" src="https://github.com/dabaizhizhu/123/as...
An incorrect access control in the access management specialist
https://api.github.com/repos/dabaizhizhu/123/issues/2/comments
1
2024-05-31T14:03:44Z
2024-06-25T03:04:00Z
https://github.com/dabaizhizhu/123/issues/2
2,327,920,599
2
6,110
CVE-2024-37679
2024-06-24T19:15:15.617
Cross Site Scripting vulnerability in Hangzhou Meisoft Information Technology Co., Ltd. Finesoft v.8.0 and before allows a remote attacker to execute arbitrary code via a crafted script to the login.jsp parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dabaizhizhu/123/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dabaizhizh...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:finesoft_project:finesoft:*:*:*:*:*:*:*:*", "matchCriteriaId": "70E70792-37E9-43F6-9270-957A167C57CF", "versionEndExcluding": null, "versionEndIncluding": "8.0", "versionStar...
[ "79" ]
79
https://github.com/dabaizhizhu/123/issues/4
[ "Exploit", "Issue Tracking" ]
github.com
[ "dabaizhizhu", "123" ]
Discovered as Fanen Software,and this type of vulnerability can be used to kill all vulnerabilities, and other products can be searched on FOFA:title="泛恩(FineSoft)医药管理软件",There are thousands of influencing IPs <img width="972" alt="屏幕截图 2024-06-01 190427" src="https://github.com/dabaizhizhu/123/assets/169583627/5bfcff...
Cross-site scripting exists in Finnesoft
https://api.github.com/repos/dabaizhizhu/123/issues/4/comments
0
2024-06-01T11:20:12Z
2024-06-01T11:20:12Z
https://github.com/dabaizhizhu/123/issues/4
2,329,086,272
4
6,111
CVE-2024-37680
2024-06-24T19:15:15.697
Hangzhou Meisoft Information Technology Co., Ltd. FineSoft <=8.0 is affected by Cross Site Scripting (XSS) which allows remote attackers to execute arbitrary code. Enter any account and password, click Login, the page will report an error, and a controllable parameter will appear at the URL:weburl.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dabaizhizhu/123/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/dabaizhizh...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:finesoft_project:finesoft:*:*:*:*:*:*:*:*", "matchCriteriaId": "70E70792-37E9-43F6-9270-957A167C57CF", "versionEndExcluding": null, "versionEndIncluding": "8.0", "versionStar...
[ "79" ]
79
https://github.com/dabaizhizhu/123/issues/5
[ "Exploit", "Issue Tracking" ]
github.com
[ "dabaizhizhu", "123" ]
Discovered as Fanen Software,and this type of vulnerability can be used to kill all vulnerabilities, and other products can be searched on FOFA:title="泛恩(FineSoft)医药管理软件",There are thousands of influencing IPs <img width="921" alt="image" src="https://github.com/dabaizhizhu/123/assets/169583627/eb936461-f19d-4f39-aba3...
Cross-site scripting exists in Finnesoft
https://api.github.com/repos/dabaizhizhu/123/issues/5/comments
0
2024-06-01T11:31:59Z
2024-06-01T11:31:59Z
https://github.com/dabaizhizhu/123/issues/5
2,329,091,419
5
6,112
CVE-2024-6372
2024-06-27T13:16:02.440
A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. This affects an unknown part of the file customeradd.php. The manipulation of the argument fullname/address/phonenumber/sex/email/city/comment leads to sql injection. It is possible to initiate the attack remot...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Galaxy-lrc/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.269805" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Galaxy-lrc/cve/issues/1
[ "Exploit" ]
github.com
[ "Galaxy-lrc", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeradd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeradd.php SQL injection
https://api.github.com/repos/Galaxy-lrc/cve/issues/1/comments
0
2024-06-26T11:04:10Z
2024-06-26T11:04:10Z
https://github.com/Galaxy-lrc/cve/issues/1
2,375,036,130
1
6,113
CVE-2024-6373
2024-06-27T13:16:02.893
A vulnerability has been found in itsourcecode Online Food Ordering System up to 1.0 and classified as critical. This vulnerability affects unknown code of the file /addproduct.php. The manipulation of the argument photo leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Abyssun/abyssun-/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.269806" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E6AA4AA-216E-471B-9107-65E50C880042", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/Abyssun/abyssun-/issues/1
[ "Exploit" ]
github.com
[ "Abyssun", "abyssun-" ]
# itsourcecode "Online Food Ordering System Project " 1.0 product.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online Food Ordering System Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/ # AFFECTED AND/OR FI...
itsourcecode "Online Food Ordering System Project " 1.0 product.php Unrestricted Upload
https://api.github.com/repos/Abyssun/abyssun-/issues/1/comments
0
2024-06-26T05:18:34Z
2024-06-26T05:18:34Z
https://github.com/Abyssun/abyssun-/issues/1
2,374,310,911
1
6,114
CVE-2024-5735
2024-06-28T12:15:10.117
Full Path Disclosure vulnerability in AdmirorFrames Joomla! extension in afHelper.php script allows an unauthorised attacker to retrieve location of web root folder. This issue affects AdmirorFrames: before 5.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cvd@cert.pl", "tags": [ "Third Party Advisory" ], "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5735/" }, { "source": "cvd@cert.pl", "tags": [ "Third Party Advisory" ], "url": "https://cert.pl/posts/2024/06/CVE-2024-5735/" }, { "source": "cvd@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:admiror-design-studio:admirorframes:*:*:*:*:*:joomla\\!:*:*", "matchCriteriaId": "C5EF0F23-1AE6-4174-96B5-D0ADAC6163BC", "versionEndExcluding": "5.0", "versionEndIncluding": null, ...
[ "497" ]
497
https://github.com/vasiljevski/admirorframes/issues/3
[ "Issue Tracking" ]
github.com
[ "vasiljevski", "admirorframes" ]
Hello. Where can we safely report security issues in this project? Regards.
Security Issues
https://api.github.com/repos/vasiljevski/admirorframes/issues/3/comments
8
2024-01-26T10:23:25Z
2024-06-28T11:53:11Z
https://github.com/vasiljevski/admirorframes/issues/3
2,101,961,100
3
6,115
CVE-2024-37741
2024-06-28T13:15:02.860
OpenPLC 3 through 9cd8f1b allows XSS via an SVG document as a profile picture.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://1d8.github.io/cves/cve_2024_37741/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/thiagoralves/OpenPLC_v3/blob/9cd8f1b53a50f9d38708096bfc72bcbb1ef47343/webserver/pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:openplcproject:openplc_v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7624BE59-886B-421D-96CC-105F185AE070", "versionEndExcluding": null, "versionEndIncluding": null, "ver...
[ "79" ]
79
https://github.com/thiagoralves/OpenPLC_v3/issues/242
[ "Exploit", "Issue Tracking" ]
github.com
[ "thiagoralves", "OpenPLC_v3" ]
Git: https://github.com/thiagoralves/OpenPLC_v3 # Stored XSS Via Profile Image Upload ## Reproduction Use this payload & save it as `image.svg`: ```svg <?xml version="1.0" standalone="no"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg version="1....
Vulnerability Found - Stored XSS via SVG File Upload
https://api.github.com/repos/thiagoralves/OpenPLC_v3/issues/242/comments
2
2024-06-03T18:10:13Z
2025-03-20T12:02:01Z
https://github.com/thiagoralves/OpenPLC_v3/issues/242
2,331,757,145
242
6,116
CVE-2024-6387
2024-07-01T13:15:06.467
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4312" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4340" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C", "versionEndExcluding": "4.4", "versionEndIncluding": null, "versionStartExcluding...
[ "362" ]
362
https://github.com/AlmaLinux/updates/issues/629
null
github.com
[ "AlmaLinux", "updates" ]
ALSA-2024:4312: openssh security update (Important) Severity: Important Description OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Possible remote c...
Release openssh-8.7p1-38.el9_4.1 ALSA-2024:4312
https://api.github.com/repos/AlmaLinux/updates/issues/629/comments
20
2024-07-03T16:55:09Z
2024-07-04T06:33:40Z
https://github.com/AlmaLinux/updates/issues/629
2,389,071,003
629
6,117
CVE-2024-6387
2024-07-01T13:15:06.467
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4312" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4340" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C", "versionEndExcluding": "4.4", "versionEndIncluding": null, "versionStartExcluding...
[ "362" ]
362
https://github.com/Azure/AKS/issues/4379
null
github.com
[ "Azure", "AKS" ]
It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials. https://ubuntu.com/security/CVE-2024-6387 **AKS Information** Upgrade your Ubuntu node image to [202407.03.0](https://git...
CVE-2024-6387: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server
https://api.github.com/repos/Azure/AKS/issues/4379/comments
18
2024-07-02T15:26:15Z
2024-07-30T18:19:50Z
https://github.com/Azure/AKS/issues/4379
2,386,561,070
4,379
6,118
CVE-2024-6387
2024-07-01T13:15:06.467
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4312" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4340" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C", "versionEndExcluding": "4.4", "versionEndIncluding": null, "versionStartExcluding...
[ "362" ]
362
https://github.com/PowerShell/Win32-OpenSSH/issues/2249
null
github.com
[ "PowerShell", "Win32-OpenSSH" ]
### Request for information CVE-2024-6387 (stylized as regreSSHion) is a Remote **Unauthenticated** Code Execution vulnerability in `sshd` in glibc-based Linux systems, discovered by [Qualys](https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerab...
Please confirm which versions (if any) are vulnerable to CVE-2024-6387
https://api.github.com/repos/PowerShell/Win32-OpenSSH/issues/2249/comments
14
2024-07-03T03:21:26Z
2024-07-12T16:48:12Z
https://github.com/PowerShell/Win32-OpenSSH/issues/2249
2,387,569,969
2,249
6,119
CVE-2024-6387
2024-07-01T13:15:06.467
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4312" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4340" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C", "versionEndExcluding": "4.4", "versionEndIncluding": null, "versionStartExcluding...
[ "362" ]
362
https://github.com/microsoft/azurelinux/issues/9555
null
github.com
[ "microsoft", "azurelinux" ]
Update openssh to version 9.8p1 to mitigate CVE-2024-6387 (https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server) We are currently on version 8.9p1 https://github.com/microsoft/azurelinux/blob/2.0/SPECS/openssh/openssh.spe...
OpenSSH critical vulnerability CVE-2024-6387
https://api.github.com/repos/microsoft/azurelinux/issues/9555/comments
3
2024-07-02T07:57:56Z
2024-07-05T15:37:39Z
https://github.com/microsoft/azurelinux/issues/9555
2,385,524,600
9,555
6,120
CVE-2024-6387
2024-07-01T13:15:06.467
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4312" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4340" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C", "versionEndExcluding": "4.4", "versionEndIncluding": null, "versionStartExcluding...
[ "362" ]
362
https://github.com/oracle/oracle-linux/issues/149
null
github.com
[ "oracle", "oracle-linux" ]
Description from RH: A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that ar...
OL9 and CVE-2024-6387
https://api.github.com/repos/oracle/oracle-linux/issues/149/comments
1
2024-07-01T14:03:56Z
2024-07-01T14:10:24Z
https://github.com/oracle/oracle-linux/issues/149
2,383,949,893
149
6,121
CVE-2024-6387
2024-07-01T13:15:06.467
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4312" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:4340" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C", "versionEndExcluding": "4.4", "versionEndIncluding": null, "versionStartExcluding...
[ "362" ]
362
https://github.com/rapier1/hpn-ssh/issues/87
null
github.com
[ "rapier1", "hpn-ssh" ]
The latest release of the hpn-ssh was based on OpenSSH 9.7, which is vulnerable to the regression of CVE-2006-5051, according to [the report](https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt) Thought it is worth raising concern about that problem, I wish I did not intervene in the normal process of de...
[Security Issue] hpn-ssh seems be to vulnerable to a critical threat CVE-2024-6387
https://api.github.com/repos/rapier1/hpn-ssh/issues/87/comments
7
2024-07-01T12:15:54Z
2024-07-03T18:28:26Z
https://github.com/rapier1/hpn-ssh/issues/87
2,383,690,887
87
6,122
CVE-2024-38953
2024-07-01T14:15:05.600
phpok 6.4.003 contains a Cross Site Scripting (XSS) vulnerability in the ok_f() method under the framework/api/upload_control.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/qinggan/phpok/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/qinggan/php...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpok:phpok:6.4.003:*:*:*:*:*:*:*", "matchCriteriaId": "BE377B1F-6F96-47F2-A732-EF6A068CAA71", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/qinggan/phpok/issues/17
[ "Exploit", "Issue Tracking" ]
github.com
[ "qinggan", "phpok" ]
In the ok_f() method under the framework/api/upload_control.php file, there exists an issue where guest users can write HTML files in base64 format. ![image](https://github.com/qinggan/phpok/assets/104112681/0f79fa43-7c1a-4e22-b734-023f36379a18) These if statements can pass through with the default given values. Add...
The PHPok 6.4.003 has an XSS vulnerability
https://api.github.com/repos/qinggan/phpok/issues/17/comments
0
2024-06-11T02:49:41Z
2024-06-11T02:49:41Z
https://github.com/qinggan/phpok/issues/17
2,345,256,673
17
6,123
CVE-2024-6438
2024-07-02T11:15:11.027
A vulnerability has been found in Hitout Carsale 1.0 and classified as critical. This vulnerability affects unknown code of the file OrderController.java. The manipulation of the argument orderBy leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Hitout/carsale/issues/23" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.270166" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hitout:carsale:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "80E1087B-FD78-44F8-BDB9-6CA4FE559F91", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "89" ]
89
https://github.com/Hitout/carsale/issues/23
[ "Exploit", "Issue Tracking" ]
github.com
[ "Hitout", "carsale" ]
SQL injection vulnerability in Hitout litemall v.1.0 allows a remote attacker to obtain sensitive information via the orderBy parameters of the OrderController.java component. 1.Steps to reproduce (复现步骤) 访问销售管理,进行查询,获取数据包 <img width="1151" alt="image" src="https://github.com/Hitout/carsale/assets/83712127/97a357ef-a...
SQL Injection Vulnerability in OrderController.java
https://api.github.com/repos/Hitout/carsale/issues/23/comments
0
2024-06-25T11:32:57Z
2024-06-25T11:32:57Z
https://github.com/Hitout/carsale/issues/23
2,372,450,382
23
6,124
CVE-2024-39143
2024-07-02T14:15:13.990
A stored cross-site scripting (XSS) vulnerability exists in ResidenceCMS 2.10.1 that allows a low-privilege user to create malicious property content with HTML inside which acts as a stored XSS payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Coderberg/ResidenceCMS/issues/128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:coderberg:residencecms:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0C50F5F-9654-44ED-BF59-B1B7D600C1ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/Coderberg/ResidenceCMS/issues/128
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Coderberg", "ResidenceCMS" ]
A stored cross-site scripting (XSS) vulnerability exists in ResidenceCMS 2.10.1 that allows a low-privilege user to create malicious property content with HTML inside it, which acts as a stored XSS payload. If this property page is visited by anyone including the administrator, then the XSS payload will be triggered. ...
A stored cross-site scripting (XSS) vulnerability exists in ResidenceCMS 2.10.1
https://api.github.com/repos/Coderberg/ResidenceCMS/issues/128/comments
4
2024-06-17T05:57:11Z
2024-07-08T00:48:29Z
https://github.com/Coderberg/ResidenceCMS/issues/128
2,356,451,596
128
6,125
CVE-2024-6453
2024-07-02T22:15:05.077
A vulnerability was found in itsourcecode Farm Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /quarantine.php?id=3. The manipulation of the argument pigno/breed/reason leads to sql injection. The attack can be launched remotely. The exploi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/7u7777/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.270241" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/7u7777/cve/issues/3
[ "Exploit" ]
github.com
[ "7u7777", "cve" ]
# Itsourcecode Farm Management System In PHP v1.0 quarantine.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Farm Management System In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + k...
Itsourcecode Farm Management System In PHP v1.0 quarantine.php SQL injection
https://api.github.com/repos/7u7777/cve/issues/3/comments
0
2024-07-02T11:37:13Z
2024-07-02T11:37:13Z
https://github.com/7u7777/cve/issues/3
2,386,023,835
3
6,126
CVE-2024-39683
2024-07-03T20:15:04.840
ZITADEL is an open-source identity infrastructure tool. ZITADEL provides users the ability to list all user sessions of the current user agent (browser). Starting in version 2.53.0 and prior to versions 2.53.8, 2.54.5, and 2.55.1, due to a missing check, user sessions without that information (e.g. when created though ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "security-advisories@github.com", "tags": [ "Permissions Required", "URL Repurposed" ], "url": "https://discord.com/channels/927474939156643850/1254096852937347153" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", "matchCriteriaId": "5976968D-F1B6-4FE8-8E2B-98BD1013BB3A", "versionEndExcluding": "2.53.8", "versionEndIncluding": null, "versionStartExclud...
[ "200" ]
200
https://github.com/zitadel/zitadel/issues/8213
[ "Issue Tracking" ]
github.com
[ "zitadel", "zitadel" ]
### Preflight Checklist - [X] I could not find a solution in the documentation, the existing issues or discussions - [x] I have joined the [ZITADEL chat](https://zitadel.com/chat) ### Environment Self-hosted ### Version _No response_ ### Database CockroachDB ### Database Version _No response_ ### Describe the...
[Bug]: critical bug in session's
https://api.github.com/repos/zitadel/zitadel/issues/8213/comments
6
2024-06-30T08:13:59Z
2024-07-10T07:22:50Z
https://github.com/zitadel/zitadel/issues/8213
2,382,142,784
8,213
6,127
CVE-2024-39027
2024-07-05T14:15:02.997
SeaCMS v12.9 has an unauthorized SQL injection vulnerability. The vulnerability is caused by the SQL injection through the cid parameter at /js/player/dmplayer/dmku/index.php?ac=edit, which can cause sensitive database information to be leaked.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/seacms-net/CMS/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/seacms-net...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "89" ]
89
https://github.com/seacms-net/CMS/issues/17
[ "Exploit", "Issue Tracking" ]
github.com
[ "seacms-net", "CMS" ]
# 总结 SeaCMS v12.9 存在未授权SQL注入漏洞,该漏洞源于/js/player/dmplayer/dmku/index.php?ac=edit处能够通过cid参数进行sql注入,从而导致数据库敏感信息泄露 ## 漏洞介绍 ![image](https://github.com/seacms-net/CMS/assets/29022490/a6758795-624f-48a3-b177-aebb5460ed2f) js/player/dmplayer/dmku/index.php处存在SQL注入,传入ac=edit能够调用`$d->编辑弹幕($cid)` ![image](https://github.co...
SeaCMS v12.9 未授权SQL注入漏洞
https://api.github.com/repos/seacms-net/CMS/issues/17/comments
0
2024-06-13T03:50:18Z
2024-06-13T03:50:18Z
https://github.com/seacms-net/CMS/issues/17
2,350,081,343
17
6,128
CVE-2024-6526
2024-07-05T14:15:03.910
A vulnerability classified as problematic has been found in CodeIgniter Ecommerce-CodeIgniter-Bootstrap up to 1998845073cf433bc6c250b0354461fbd84d0e03. This affects an unknown part. The manipulation of the argument search_title/catName/sub/name/categorie leads to cross site scripting. It is possible to initiate the att...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/1b3da45308bb6c3f55247d0e99620b600bd85277" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ecommerce-codeigniter-bootstrap_project:ecommerce-codeigniter-bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "D503CE1E-D0C7-40A2-B201-DD0A72728AC7", "versionEndExcluding": "2024-07-03", ...
[ "79" ]
79
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263
[ "Exploit", "Issue Tracking" ]
github.com
[ "kirilkirkov", "Ecommerce-CodeIgniter-Bootstrap" ]
Hello I've found multiples XSS in the application that allow an attacker to steal the administrator session, in one hand this vulnerability represent a hisg risk to the customers and user due to a malicious user will decrease the price of the item in the other hand could lead a denegation of service. Please contact ...
Multiples xss in the application request to open a CVE
https://api.github.com/repos/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263/comments
3
2024-06-25T00:23:08Z
2024-07-04T01:04:31Z
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263
2,371,350,372
263
6,129
CVE-2024-6526
2024-07-05T14:15:03.910
A vulnerability classified as problematic has been found in CodeIgniter Ecommerce-CodeIgniter-Bootstrap up to 1998845073cf433bc6c250b0354461fbd84d0e03. This affects an unknown part. The manipulation of the argument search_title/catName/sub/name/categorie leads to cross site scripting. It is possible to initiate the att...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/1b3da45308bb6c3f55247d0e99620b600bd85277" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ecommerce-codeigniter-bootstrap_project:ecommerce-codeigniter-bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "D503CE1E-D0C7-40A2-B201-DD0A72728AC7", "versionEndExcluding": "2024-07-03", ...
[ "79" ]
79
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263#issuecomment-2199387443
[ "Exploit", "Issue Tracking" ]
github.com
[ "kirilkirkov", "Ecommerce-CodeIgniter-Bootstrap" ]
Hello I've found multiples XSS in the application that allow an attacker to steal the administrator session, in one hand this vulnerability represent a hisg risk to the customers and user due to a malicious user will decrease the price of the item in the other hand could lead a denegation of service. Please contact ...
Multiples xss in the application request to open a CVE
https://api.github.com/repos/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263/comments
3
2024-06-25T00:23:08Z
2024-07-04T01:04:31Z
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263
2,371,350,372
263
6,130
CVE-2024-39308
2024-07-08T15:15:22.080
RailsAdmin is a Rails engine that provides an interface for managing data. RailsAdmin list view has the XSS vulnerability, caused by improperly-escaped HTML title attribute. Upgrade to 3.1.3 or 2.2.2 (to be released).
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/railsadminteam/rails_admin/commit/b5a287d82e2cbd1737a1a01e11ede2911cce7fef" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/r...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rails_admin_project:rails_admin:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "5835771A-4E7F-409A-939E-8442D2E9A5CE", "versionEndExcluding": "2.3.0", "versionEndIncluding": null, "...
[ "79" ]
79
https://github.com/railsadminteam/rails_admin/issues/3686
[ "Issue Tracking" ]
github.com
[ "railsadminteam", "rails_admin" ]
**Describe the bug** Storing content in a field that contains quotes results in only the content before the first quote is in the title. The rest of the content is stored in the tag as individual attributes. _We noticed this when the word `hidden` was stored after a quote, which resulted in the cell being hidden...
StringLike field with quotes breaks out of title
https://api.github.com/repos/railsadminteam/rails_admin/issues/3686/comments
4
2024-06-11T14:16:31Z
2024-07-09T11:35:51Z
https://github.com/railsadminteam/rails_admin/issues/3686
2,346,558,651
3,686
6,131
CVE-2024-39677
2024-07-08T15:15:22.450
NHibernate is an object-relational mapper for the .NET framework. A SQL injection vulnerability exists in some types implementing ILiteralType.ObjectToSQLString. Callers of these methods are exposed to the vulnerability, which includes mappings using inheritance with discriminator values; HQL queries referencing a stat...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "int...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/nhibernate/nhibernate-core/commit/b4a69d1a5ff5744312478d70308329af496e4ba9" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nhibernate:nhibernate-core:*:*:*:*:*:*:*:*", "matchCriteriaId": "23371DC1-350D-459D-AB4F-1E251FC87BB8", "versionEndExcluding": "5.4.9", "versionEndIncluding": null, "versionS...
[ "89" ]
89
https://github.com/nhibernate/nhibernate-core/issues/3516
[ "Issue Tracking" ]
github.com
[ "nhibernate", "nhibernate-core" ]
While working with DateOnly and TimeOnly support I realized that the ObjectToSQLString method of ILiteralType is quite problematic. **AbstractStringType**: `"'" + (string)value + "'"` - SQL injection - No N-prefix for unicode (required in SQL server when the string is outside ANSI) **AbstractCharType**: `'...
ObjectToSQLString implementations are problematic
https://api.github.com/repos/nhibernate/nhibernate-core/issues/3516/comments
10
2024-04-02T09:32:30Z
2024-07-06T08:28:51Z
https://github.com/nhibernate/nhibernate-core/issues/3516
2,220,019,103
3,516
6,132
CVE-2024-39203
2024-07-08T16:15:08.570
A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/5r1an/CVE-2024-39203/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zblogcn:z-blogphp:*:*:*:*:*:*:*:*", "matchCriteriaId": "2467D5DF-869D-4B54-83CB-90349C9A2B87", "versionEndExcluding": null, "versionEndIncluding": "1.7.3.3230", "versionStart...
[ "79" ]
79
https://github.com/5r1an/CVE-2024-39203/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "5r1an", "CVE-2024-39203" ]
[CVE ID] CVE-2024-39203 [Suggested description] A cross-site scripting (XSS) vulnerability in the Backend Theme. Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. [Vulnerability Type] Cross Site Scripting (XSS) [Vendor of Product] https...
CVE-2024-39203
https://api.github.com/repos/5r1an/CVE-2024-39203/issues/1/comments
0
2024-07-04T02:31:36Z
2024-07-04T02:31:36Z
https://github.com/5r1an/CVE-2024-39203/issues/1
2,389,798,993
1
6,133
CVE-2024-6237
2024-07-09T17:15:48.960
A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "secalert@redhat.com", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2024:4997" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2024:5192" }, { "source": "secalert@redhat.com", "tags": [ "Vendor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3DAF61A-58A9-41A6-A4DC-64148055B0C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "230" ]
230
https://github.com/389ds/389-ds-base/issues/5989
[ "Issue Tracking" ]
github.com
[ "389ds", "389-ds-base" ]
**Problem to solve** Computation of membership (like 'memberof') is a common issue. The issue is more expensive to solve when there are nested membership. For example "gives me all the groups this entry belongs to" or "gives me all subordinates having this manager". Either the LDAP client computes the values or dedica...
RFE support of inChain Matching Rule
https://api.github.com/repos/389ds/389-ds-base/issues/5989/comments
1
2023-11-21T09:38:20Z
2024-01-12T10:17:14Z
https://github.com/389ds/389-ds-base/issues/5989
2,003,851,471
5,989
6,134
CVE-2024-37873
2024-07-09T20:15:11.923
SQL injection vulnerability in view_payslip.php in Itsourcecode Payroll Management System Project In PHP With Source Code 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/TThuyyy/cve1/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:itsourcecode:payroll_management_system_project_in_php_with_source_code:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "339EF973-A352-4EDB-A6C5-E41FD76AB23F", "versionEndExcluding": null, "versio...
[ "89" ]
89
https://github.com/TThuyyy/cve1/issues/2
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "TThuyyy", "cve1" ]
# Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 view_payslip.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Payroll Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/payroll-system-php/ # AFFECTED AND...
Itsourcecode Payroll Management System Project In PHP With Source Code v1.0 view_payslip.php SQL injection
https://api.github.com/repos/TThuyyy/cve1/issues/2/comments
0
2024-06-07T13:30:36Z
2024-06-09T05:59:31Z
https://github.com/TThuyyy/cve1/issues/2
2,340,468,618
2
6,135
CVE-2024-6652
2024-07-10T23:15:15.250
A vulnerability was found in itsourcecode Gym Management System 1.0. It has been classified as critical. This affects an unknown part of the file manage_member.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/littletree7/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.271059" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adrianmercurio:gym_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "19A6E4EB-8256-48FE-BEAC-DFF12DF7D862", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/littletree7/cve/issues/1
[ "Exploit" ]
github.com
[ "littletree7", "cve" ]
# Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_member.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Gym Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/gym-management-system-project-in-php-with-source-cod...
Itsourcecode Gym Management System Project In PHP With Source Code v1.0 manage_member.php SQL injection
https://api.github.com/repos/littletree7/cve/issues/1/comments
0
2024-07-10T08:44:12Z
2024-07-10T08:44:12Z
https://github.com/littletree7/cve/issues/1
2,400,132,675
1
6,136
CVE-2024-6653
2024-07-11T00:15:02.313
A vulnerability was found in code-projects Simple Task List 1.0. It has been declared as critical. This vulnerability affects unknown code of the file loginForm.php of the component Login. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hantianj/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.271060" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:simple_task_list:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B691815C-6D04-44C0-9DB6-B189933EFC52", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/hantianj/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hantianj", "cve" ]
# code-projects Simple Task List In PHP With Source Code v1.0 loginForm.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Simple Task List In PHP With Source Code ## Vendor Homepage + https://code-projects.org/simple-task-list-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + hantian ##...
code-projects Simple Task List In PHP With Source Code v1.0 loginForm.php SQL injection
https://api.github.com/repos/hantianj/cve/issues/1/comments
0
2024-07-10T10:39:45Z
2024-07-10T10:39:45Z
https://github.com/hantianj/cve/issues/1
2,400,390,282
1
6,137
CVE-2024-6728
2024-07-14T01:15:01.940
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file typeedit.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeery0/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.271401"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/jeery0/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeery0", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 typeedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-wi...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 typeedit.php SQL injection
https://api.github.com/repos/jeery0/cve/issues/1/comments
0
2024-07-11T11:39:02Z
2024-07-11T11:42:24Z
https://github.com/jeery0/cve/issues/1
2,402,963,564
1
6,138
CVE-2024-6733
2024-07-14T23:15:02.290
A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file templateedit.php. The manipulation of the argument id/title/msg leads to sql injection. The attack may be launched remotely. The exploit has been disclos...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/jiaoyanshuai/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271454" }, { "source": "cna@vuldb.com", "tags": [...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/jiaoyanshuai/cve/issues/1
[ "Exploit" ]
github.com
[ "jiaoyanshuai", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 templateedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-ph...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 templateedit.php SQL injection
https://api.github.com/repos/jiaoyanshuai/cve/issues/1/comments
0
2024-07-14T02:35:29Z
2024-07-14T02:35:29Z
https://github.com/jiaoyanshuai/cve/issues/1
2,407,237,583
1
6,139
CVE-2024-6734
2024-07-15T00:15:01.913
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file templateadd.php. The manipulation of the argument title/msg leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/jiaoyanshuai/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271455" }, { "source": "cna@vuldb.com", "tags": [...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/jiaoyanshuai/cve/issues/2
[ "Exploit" ]
github.com
[ "jiaoyanshuai", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 templateadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 templateadd.php SQL injection
https://api.github.com/repos/jiaoyanshuai/cve/issues/2/comments
0
2024-07-14T02:37:23Z
2024-07-14T02:37:23Z
https://github.com/jiaoyanshuai/cve/issues/2
2,407,237,943
2
6,140
CVE-2024-6735
2024-07-15T00:15:02.207
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file setgeneral.php. The manipulation of the argument sitename/email/mobile/sms/currency leads to sql injection. The attack can be initiated remotely. The exploit h...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xzyxiaohaha/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271456" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/xzyxiaohaha/cve/issues/1
[ "Exploit" ]
github.com
[ "xzyxiaohaha", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 setgeneral.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 setgeneral.php SQL injection
https://api.github.com/repos/xzyxiaohaha/cve/issues/1/comments
0
2024-07-14T06:44:57Z
2024-07-14T06:44:57Z
https://github.com/xzyxiaohaha/cve/issues/1
2,407,293,840
1
6,141
CVE-2024-6745
2024-07-15T11:15:02.450
A vulnerability classified as critical has been found in code-projects Simple Ticket Booking 1.0. Affected is an unknown function of the file adminauthenticate.php of the component Login. The manipulation of the argument email/password leads to sql injection. It is possible to launch the attack remotely. The exploit ha...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xzyxiaohaha/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271476" }, { "source": "cna@vu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:simple_ticket_booking:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D14B5958-44A0-40EB-A3EC-02065AFD7652", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/xzyxiaohaha/cve/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "xzyxiaohaha", "cve" ]
# code-projects Simple Ticket Booking In PHP With Source Code v1.0 adminauthenticate.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Simple Ticket Booking In PHP With Source Code ## Vendor Homepage + https://code-projects.org/ticket-booking-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitte...
code-projects Simple Ticket Booking In PHP With Source Code v1.0 adminauthenticate.php SQL injection
https://api.github.com/repos/xzyxiaohaha/cve/issues/2/comments
0
2024-07-15T05:51:46Z
2024-07-15T05:51:46Z
https://github.com/xzyxiaohaha/cve/issues/2
2,407,912,269
2
6,142
CVE-2024-6746
2024-07-15T12:15:02.707
A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \EasySpider\resources\app\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PART...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/NaiboWang/EasySpider/issues/466" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271477" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:easyspider:easyspider:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "99029D7E-D899-4908-819E-BCE6EA9944DE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "22" ]
22
https://github.com/NaiboWang/EasySpider/issues/466
[ "Exploit", "Issue Tracking" ]
github.com
[ "NaiboWang", "EasySpider" ]
# 摘要 EasySpider Version 0.6.2 Windows 存在任意文件读取漏洞,攻击者可以读取EasySpider应用所在磁盘的任意文件而不受访问控制限制,该漏洞将导致严重的敏感信息泄露、系统崩溃等问题。 ``` # Summary EasySpider Version 0.6.2 for Windows has an arbitrary file read vulnerability. An attacker can read any file on the disk where the EasySpider application is located without access control re...
EasySpider Version 0.6.2 Windows 存在任意文件读取漏洞
https://api.github.com/repos/NaiboWang/EasySpider/issues/466/comments
2
2024-07-09T16:38:17Z
2024-09-08T11:54:00Z
https://github.com/NaiboWang/EasySpider/issues/466
2,398,676,797
466
6,143
CVE-2024-39036
2024-07-16T19:15:12.460
SeaCMS v12.9 is vulnerable to Arbitrary File Read via admin_safe.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seacms-net/CMS/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "22" ]
22
https://github.com/seacms-net/CMS/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "seacms-net", "CMS" ]
## Summary SeaCMS v12.9 has an arbitrary file read vulnerability in the admin/adminsafe.php file, allowing attackers to read system files after accessing the Website back end. ## Detail file_get_contents in line 94 is the vulnerability trigger, and its argument are obtained by the GET method. ![image](https://gi...
Arbitrary File Read in SeaCMS v12.9
https://api.github.com/repos/seacms-net/CMS/issues/18/comments
1
2024-06-13T07:13:24Z
2024-09-21T17:05:44Z
https://github.com/seacms-net/CMS/issues/18
2,350,347,975
18
6,144
CVE-2024-40129
2024-07-16T19:15:12.600
Open5GS v2.6.4 is vulnerable to Buffer Overflow. via /lib/pfcp/context.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/open5gs/open5gs/commit/2fbc445d32aa7749166396a9c055a199f90a1b01" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:open5gs:open5gs:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "67C9257A-E21A-4D91-8B2C-745841387FC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/open5gs/open5gs/issues/2585
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "open5gs", "open5gs" ]
### Open5GS Release, Revision, or Tag v2.6.4 ### Steps to reproduce According to "Building Open5GS from Sources," I compiled Open5GS with ASAN on ubuntu 20.04. Then I follow "Open5GS 5GC & UERANSIM UE / RAN Sample Configuration" and run Open5GS 5GC C-Plane, ASAN reported the following information: ### Logs ```she...
[Bug]: Possible heap-buffer-overflow in /lib/pfcp/context.c
https://api.github.com/repos/open5gs/open5gs/issues/2585/comments
1
2023-09-05T14:50:54Z
2023-09-08T02:05:23Z
https://github.com/open5gs/open5gs/issues/2585
1,882,140,916
2,585
6,145
CVE-2024-40130
2024-07-16T19:15:12.683
open5gs v2.6.4 is vulnerable to Buffer Overflow. via /lib/core/abts.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/open5gs/open5gs/commit/2f8ae91b0b9467f94f128090c88cae91bd73e008" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:open5gs:open5gs:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "67C9257A-E21A-4D91-8B2C-745841387FC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/open5gs/open5gs/issues/2577
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "open5gs", "open5gs" ]
### Open5GS Release, Revision, or Tag v2.6.4 ### Steps to reproduce According to "Building Open5GS from Sources," I compiled Open5GS with ASAN on ubuntu 20.04. After the compilation was completed, I ran meson test -v in the build directory, and ASAN reported the following information: ==23232==ERROR: Addres...
[Bug]: Possible dynamic-stack-buffer-overflow in /lib/core/abts.c
https://api.github.com/repos/open5gs/open5gs/issues/2577/comments
0
2023-09-05T07:38:00Z
2023-09-08T02:03:41Z
https://github.com/open5gs/open5gs/issues/2577
1,881,388,679
2,577
6,146
CVE-2024-40393
2024-07-16T19:15:12.873
Online Clinic Management System In PHP With Free Source code v1.0 was discovered to contain a SQL injection vulnerability via the user parameter at login.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:online_clinic_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F83E07A-EC1A-47DB-ACEE-279F60BD4F0A", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/47
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# SourceCodester Online Clinic Management System In PHP With Free Source code 1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Clinic Management System In PHP With Free Source code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-clinic-management-system-php-projects-...
SourceCodester Online Clinic Management System In PHP With Free Source code 1.0 login.php SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/47/comments
0
2024-06-28T15:28:44Z
2024-06-28T16:25:30Z
https://github.com/CveSecLook/cve/issues/47
2,380,682,375
47
6,147
CVE-2024-6801
2024-07-17T02:15:10.367
A vulnerability, which was classified as critical, has been found in SourceCodester Online Student Management System 1.0. This issue affects some unknown processing of the file /add-students.php. The manipulation of the argument image leads to unrestricted upload. The attack may be initiated remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aaajuna/demo/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271703" }, { "source": "cna...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_student_management_system_project:online_student_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "422F2579-A688-4D6E-97D2-873C5BCABFD8", "versionEndExcluding": null, "ver...
[ "434" ]
434
https://github.com/aaajuna/demo/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aaajuna", "demo" ]
# SourceCodester Online student management system in php free download /add-students.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Online student management system in php free download ## Vendor Homepage + https://www.sourcecodester.com/php/16137/online-student-management-system-php-free-download.html # ...
SourceCodester Online student management system in php free download /add-students.php Unrestricted Upload
https://api.github.com/repos/aaajuna/demo/issues/1/comments
0
2024-07-15T06:08:37Z
2024-07-15T06:08:37Z
https://github.com/aaajuna/demo/issues/1
2,407,932,109
1
6,148
CVE-2024-6803
2024-07-17T03:15:02.130
A vulnerability has been found in itsourcecode Document Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file insert.php. The manipulation of the argument anothercont leads to sql injection. The attack can be launched remotely. The exploit has been disc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hzy11111111/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271705" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:document_management_system_project:document_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "120BA9C1-F846-4761-B02A-2880FDD0D36C", "versionEndExcluding": null, "versionEndInclu...
[ "89" ]
89
https://github.com/hzy11111111/cve/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hzy11111111", "cve" ]
# Itsourcecode Document Management System Open Source PHP v1.0 insert.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Document Management System Open Source PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/document-management-system-open-source-php/ # AFFECTED AND/OR FIXED VERSION(S) ...
Itsourcecode Document Management System Open Source PHP v1.0 insert.php SQL injection
https://api.github.com/repos/hzy11111111/cve/issues/3/comments
0
2024-07-15T07:00:04Z
2024-07-15T07:00:04Z
https://github.com/hzy11111111/cve/issues/3
2,408,006,229
3
6,149
CVE-2024-6808
2024-07-17T04:15:03.320
A vulnerability was found in itsourcecode Simple Task List 1.0. It has been classified as critical. This affects the function insertUserRecord of the file signUp.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/qianqiusujiu/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271707"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:simple_task_list:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B691815C-6D04-44C0-9DB6-B189933EFC52", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/qianqiusujiu/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "qianqiusujiu", "cve" ]
# code-projects Simple Task List In PHP With Source Code v1.0 signUp.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Simple Task List In PHP With Source Code ## Vendor Homepage + https://code-projects.org/simple-task-list-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + qianqiu ## Vu...
code-projects Simple Task List In PHP With Source Code v1.0 signUp.php SQL injection
https://api.github.com/repos/qianqiusujiu/cve/issues/1/comments
0
2024-07-16T02:58:08Z
2024-07-16T02:58:08Z
https://github.com/qianqiusujiu/cve/issues/1
2,410,083,624
1
6,150
CVE-2023-43971
2024-07-17T22:15:03.627
Cross Site Scripting vulnerability in ACG-faka v1.1.7 allows a remote attacker to execute arbitrary code via the encode parameter in Index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/N0boy-0/7251856fed517eb6358d8cae03099b7b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lizhipay:acg-faka:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "ADD2505E-412F-45CF-B53F-0687C0D16A6B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/lizhipay/acg-faka/issues/72
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "lizhipay", "acg-faka" ]
Get the base64 encode parameter in Index.php, which can successfully bypass the WAF and cause it to be rendered on the page. ![xss1](https://github.com/lizhipay/acg-faka/assets/63273184/d0f713f3-ab54-4422-bb59-61ffbb7d9b59) ![xss2](https://github.com/lizhipay/acg-faka/assets/63273184/d48b905c-cebf-4796-93a3-fc96e9ce3...
There is an xss vulnerability in app/Controller/User/Index.php
https://api.github.com/repos/lizhipay/acg-faka/issues/72/comments
1
2023-09-21T11:14:57Z
2023-12-17T05:38:08Z
https://github.com/lizhipay/acg-faka/issues/72
1,906,728,558
72
6,151
CVE-2024-41107
2024-07-19T11:15:03.323
The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/19/1" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", "matchCriteriaId": "36C67E7A-D4BB-4387-B6E3-BBD3664BAC4F", "versionEndExcluding": "4.18.2.2", "versionEndIncluding": null, "versionStartEx...
[ "290" ]
290
https://github.com/apache/cloudstack/issues/4519
[ "Issue Tracking" ]
github.com
[ "apache", "cloudstack" ]
<!-- Verify first that your issue/request is not already reported on GitHub. Also test if the latest release and master branch are affected too. Always add information AFTER of these HTML comments, but no need to delete the comments. --> ##### ISSUE TYPE <!-- Pick one below and delete the rest --> * Bug Repor...
SAML signature is optional
https://api.github.com/repos/apache/cloudstack/issues/4519/comments
24
2020-12-04T14:19:36Z
2024-07-31T10:08:53Z
https://github.com/apache/cloudstack/issues/4519
757,137,507
4,519
6,152
CVE-2024-41121
2024-07-19T20:15:08.180
Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally pr...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://github.com/woodpecker-ci/woodpecker-security/issues/8" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://github.com/woodpecker-ci/woodpec...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FFB6F4F-B936-4455-9130-B6BD0EFD9D46", "versionEndExcluding": "2.7.0", "versionEndIncluding": null, "versionSta...
[ "74" ]
74
https://github.com/woodpecker-ci/woodpecker/issues/3924
[ "Patch" ]
github.com
[ "woodpecker-ci", "woodpecker" ]
# Getting privileged permissions using an escalated plugin by adjusting workspace Dear Woodpecker Security Team, I am writing to inform you about the possibility of running arbitrary code in a privileged container using the default configuration. As you know, the default configuration has multiple containers tha...
Getting "privileged permissions" / "secrets value" by using (... an escalated plugin and/) by adjusting workspace
https://api.github.com/repos/woodpecker-ci/woodpecker/issues/3924/comments
0
2024-07-18T00:33:36Z
2024-10-04T14:06:28Z
https://github.com/woodpecker-ci/woodpecker/issues/3924
2,414,900,450
3,924
6,153
CVE-2024-41122
2024-07-19T20:15:08.430
Woodpecker is a simple yet powerful CI/CD engine with great extensibility. The server allow to create any user who can trigger a pipeline run malicious workflows: 1. Those workflows can either lead to a host takeover that runs the agent executing the workflow. 2. Or allow to extract the secrets who would be normally pr...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://github.com/woodpecker-ci/woodpecker-security/issues/10" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/woodpecker-ci/woodpecker/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:woodpecker-ci:woodpecker:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FFB6F4F-B936-4455-9130-B6BD0EFD9D46", "versionEndExcluding": "2.7.0", "versionEndIncluding": null, "versionSta...
[ "74" ]
74
https://github.com/woodpecker-ci/woodpecker/issues/3929
[ "Patch" ]
github.com
[ "woodpecker-ci", "woodpecker" ]
> Using a "dangerous" env var like `LD_PRELOAD` could allow to escape the plugins default entrypoint to execute malicious code using privileged permissions of an escalated plugin. > > https://stackoverflow.com/questions/426230/what-is-the-ld-preload-trick _Originally posted by @anbraten in https://github.com/wood...
Getting privileged permissions using a "dangerous" env var with a escalated plugin
https://api.github.com/repos/woodpecker-ci/woodpecker/issues/3929/comments
7
2024-07-18T18:47:53Z
2024-10-04T13:58:44Z
https://github.com/woodpecker-ci/woodpecker/issues/3929
2,417,135,603
3,929
6,154
CVE-2024-6932
2024-07-20T22:15:10.190
A vulnerability was found in ClassCMS 4.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/?action=home&do=shop:index&keyword=&kind=all. The manipulation of the argument order leads to cross site scripting. The attack can be launched remotely. The explo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/42" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271987" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:classcms_project:classcms:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "EBE32DE9-5B81-449F-A6C5-869FB0C110E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/42
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary ClassCMS version 4.5 has a reflected XSS vulnerability that allows attackers to execute any web script or HTML by injecting a carefully crafted payload into the `order` field. # Details http://your-ip/admin/?action=home&do=shop:index&keyword=&kind=all&order=%22%3E%3Cscript%3Ealert(document.cookie)%3C/scrip...
ClassCMS v4.5 has a reflected XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/42/comments
1
2024-05-17T07:32:13Z
2024-07-24T02:48:21Z
https://github.com/Hebing123/cve/issues/42
2,302,024,779
42
6,155
CVE-2024-6939
2024-07-21T05:15:04.310
A vulnerability was found in Xinhu RockOA 2.6.3 and classified as problematic. Affected by this issue is the function okla of the file /webmain/public/upload/tpl_upload.html. The manipulation of the argument callback leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rainrocka/xinhu/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.271994" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xinhu:rockoa:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8057234-AE8B-466D-A3E7-B507E509C675", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/rainrocka/xinhu/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rainrocka", "xinhu" ]
# Summary A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in Xinhu RockOA v2.6.3, existing in the `Callback` parameter of `/webmain/public/upload/tpl_upload.html`. # Details In `/webmain/public/upload/tpl_upload.html`, since the callback variable is directly concatenated into the script tag ...
Reflected XSS Vulnerability in Xinhu RockOA v2.6.3
https://api.github.com/repos/rainrocka/xinhu/issues/7/comments
0
2024-07-11T06:18:44Z
2024-07-11T06:20:24Z
https://github.com/rainrocka/xinhu/issues/7
2,402,344,676
7
6,156
CVE-2024-6941
2024-07-21T06:15:05.550
A vulnerability, which was classified as problematic, has been found in ThinkSAAS 3.7.0. This issue affects some unknown processing of the file app/system/action/do.php. The manipulation of the argument site_title/site_subtitle/site_key/site_desc/site_url/site_email/site_icp leads to cross site scripting. The attack ma...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinksaas/ThinkSAAS/issues/36" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.272...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinksaas:thinksaas:3.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E05186E-7A81-4B66-8B49-B69B6B9E8ED2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/thinksaas/ThinkSAAS/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thinksaas", "ThinkSAAS" ]
# Summary The ThinkSAAS 3.7.0 application contains a storage XSS vulnerability caused by insufficient sanitization of user input. Specifically, the parameters `site_title`, `site_subtitle`, `site_key`, `site_desc`, `site_url`, `site_email`, and `site_icp` are not properly filtered for malicious code in `app/system/act...
ThinkSAAS 3.7.0 has a storage XSS vulnerability
https://api.github.com/repos/thinksaas/ThinkSAAS/issues/36/comments
0
2024-07-12T06:58:19Z
2024-07-12T07:12:41Z
https://github.com/thinksaas/ThinkSAAS/issues/36
2,404,894,580
36
6,157
CVE-2024-6942
2024-07-21T07:15:05.887
A vulnerability, which was classified as problematic, was found in ThinkSAAS 3.7.0. Affected is an unknown function of the file app/system/action/anti.php of the component Admin Panel Security Center. The manipulation of the argument ip/email/phone leads to cross site scripting. It is possible to launch the attack remo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinksaas/ThinkSAAS/issues/37" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.272...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinksaas:thinksaas:3.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E05186E-7A81-4B66-8B49-B69B6B9E8ED2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/thinksaas/ThinkSAAS/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thinksaas", "ThinkSAAS" ]
# Summary ThinkSAAS version 3.7.0 contains multiple stored Cross-Site Scripting (XSS) vulnerabilities. These vulnerabilities occur due to the lack of proper filtering of input variables in the `app/system/action/anti.php` file. The vulnerabilities are present in various functionalities such as IP filtering, Email fi...
ThinkSAAS 3.7.0 has a storage XSS vulnerability
https://api.github.com/repos/thinksaas/ThinkSAAS/issues/37/comments
0
2024-07-12T07:25:04Z
2024-07-12T07:26:36Z
https://github.com/thinksaas/ThinkSAAS/issues/37
2,404,934,876
37
6,158
CVE-2024-6953
2024-07-21T12:15:02.500
A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. This issue affects some unknown processing of the file sms.php. The manipulation of the argument customer leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and m...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/333-uit/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/333-uit/CVE/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "333-uit", "CVE" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 sms.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-so...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 sms.php SQL injection
https://api.github.com/repos/333-uit/CVE/issues/1/comments
0
2024-07-18T07:46:26Z
2024-07-18T07:46:26Z
https://github.com/333-uit/CVE/issues/1
2,415,633,245
1
6,159
CVE-2024-6966
2024-07-22T03:15:02.310
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file login.php of the component Login. The manipulation of the argument user/pass leads to sql injection. The attack may be launched remotely. The exp...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/HermesCui/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.272120" }, { "source": "cna@vuld...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": n...
[ "89" ]
89
https://github.com/HermesCui/CVE/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "HermesCui", "CVE" ]
# Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "login.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Blood Bank Management System" in PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/ # AFFECTED AND/...
Itsourcecode "Online Blood Bank Management System" in PHP 1.0 "login.php" SQL injection
https://api.github.com/repos/HermesCui/CVE/issues/1/comments
0
2024-07-21T00:54:16Z
2024-07-22T07:28:40Z
https://github.com/HermesCui/CVE/issues/1
2,421,150,437
1
6,160
CVE-2024-7067
2024-07-24T14:15:06.593
A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization. The attack may be la...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/commit/a02111a674ab49f65018b31da3011b1e396f59b1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shuttur:ecommerce-laravel-bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1B43EF4-9E43-47B2-B8A3-D24AFFA3C0A9", "versionEndExcluding": "2024-07-03", "versionEndIncluding": null, ...
[ "502" ]
502
https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "kirilkirkov", "Ecommerce-Laravel-Bootstrap" ]
Dear reader(s), I have found a vulnerability in the code. Can you please share the contact details to report a vulnerability I have found or enable the security policy so that I can fill a report? Awaiting the response and suggested next steps. Kind Regards, R.
Found a Vulnerability in the code
https://api.github.com/repos/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18/comments
8
2024-06-25T15:41:31Z
2024-07-17T05:39:57Z
https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18
2,373,017,859
18
6,161
CVE-2024-7067
2024-07-24T14:15:06.593
A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization. The attack may be la...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/commit/a02111a674ab49f65018b31da3011b1e396f59b1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shuttur:ecommerce-laravel-bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1B43EF4-9E43-47B2-B8A3-D24AFFA3C0A9", "versionEndExcluding": "2024-07-03", "versionEndIncluding": null, ...
[ "502" ]
502
https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18#issuecomment-2192470359
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "kirilkirkov", "Ecommerce-Laravel-Bootstrap" ]
Dear reader(s), I have found a vulnerability in the code. Can you please share the contact details to report a vulnerability I have found or enable the security policy so that I can fill a report? Awaiting the response and suggested next steps. Kind Regards, R.
Found a Vulnerability in the code
https://api.github.com/repos/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18/comments
8
2024-06-25T15:41:31Z
2024-07-17T05:39:57Z
https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18
2,373,017,859
18
6,162
CVE-2024-7067
2024-07-24T14:15:06.593
A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization. The attack may be la...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/commit/a02111a674ab49f65018b31da3011b1e396f59b1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shuttur:ecommerce-laravel-bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1B43EF4-9E43-47B2-B8A3-D24AFFA3C0A9", "versionEndExcluding": "2024-07-03", "versionEndIncluding": null, ...
[ "502" ]
502
https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18#issuecomment-2206863135
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "kirilkirkov", "Ecommerce-Laravel-Bootstrap" ]
Dear reader(s), I have found a vulnerability in the code. Can you please share the contact details to report a vulnerability I have found or enable the security policy so that I can fill a report? Awaiting the response and suggested next steps. Kind Regards, R.
Found a Vulnerability in the code
https://api.github.com/repos/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18/comments
8
2024-06-25T15:41:31Z
2024-07-17T05:39:57Z
https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18
2,373,017,859
18
6,163
CVE-2024-7081
2024-07-24T21:15:12.913
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file expcatadd.php. The manipulation of the argument id/title leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zgg012/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": null, "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tailoring_management_system_project:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5480D1D7-8F9B-4A1F-A973-AFCA69DF4620", "versionEndExcluding": null, "versionEndInc...
[ "89" ]
89
https://github.com/zgg012/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zgg012", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expcatadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expcatadd.php SQL injection
https://api.github.com/repos/zgg012/cve/issues/1/comments
0
2024-07-24T13:10:45Z
2024-07-24T13:10:45Z
https://github.com/zgg012/cve/issues/1
2,427,552,836
1
6,164
CVE-2024-7161
2024-07-28T16:15:02.047
A vulnerability classified as problematic was found in SeaCMS 13.0. Affected by this vulnerability is an unknown functionality of the file /member.php?action=chgpwdsubmit of the component Password Change Handler. The manipulation of the argument newpwd/newpwd2 leads to cross-site request forgery. The attack can be laun...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HuaQiPro/seacms/issues/30" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.272575" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seacms:seacms:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "E86E61D7-442D-43D0-845F-B7858A4F2B4E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "352" ]
352
https://github.com/HuaQiPro/seacms/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "HuaQiPro", "seacms" ]
# Summary A Cross-Site Request Forgery (CSRF) vulnerability has been identified in SeaCms V13.0. This vulnerability allows an attacker to change a user's password without their consent by tricking them into visiting a malicious webpage. # POC ``` POST /member.php?action=chgpwdsubmit HTTP/1.1 Host: your-ip Conte...
CSRF Vulnerability in SeaCms V13.0
https://api.github.com/repos/HuaQiPro/seacms/issues/30/comments
1
2024-07-08T09:50:23Z
2024-07-29T02:24:33Z
https://github.com/HuaQiPro/seacms/issues/30
2,395,172,359
30
6,165
CVE-2024-7162
2024-07-28T16:15:02.347
A vulnerability, which was classified as problematic, has been found in SeaCMS 12.9/13.0. Affected by this issue is some unknown functionality of the file js/player/dmplayer/admin/post.php?act=setting. The manipulation of the argument yzm leads to cross site scripting. The attack may be launched remotely. The exploit h...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/HuaQiPro/seacms/issues/29" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/HuaQiPro/seacms/issues/29
[ "Exploit", "Third Party Advisory" ]
github.com
[ "HuaQiPro", "seacms" ]
# Summary SeaCms V12.9 contains multiple stored XSS vulnerabilities originating from insufficient filtering of several configuration variables in data.php related to `$yzm`. These vulnerabilities can be exploited through the `js/player/dmplayer/admin/post.php?act=setting` endpoint, where multiple configuration variabl...
SeaCms V12.9 Multiple Stored XSS Vulnerabilities
https://api.github.com/repos/HuaQiPro/seacms/issues/29/comments
1
2024-07-08T07:47:04Z
2024-07-29T02:24:53Z
https://github.com/HuaQiPro/seacms/issues/29
2,394,902,847
29
6,166
CVE-2024-7163
2024-07-28T17:15:09.797
A vulnerability, which was classified as problematic, was found in SeaCMS 12.9. This affects an unknown part of the file /js/player/dmplayer/player/index.php. The manipulation of the argument color/vid/url leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HuaQiPro/seacms/issues/28" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.272577"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/HuaQiPro/seacms/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HuaQiPro", "seacms" ]
# Summary A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the SeaCms V12.9. Multiple reflective XSS vulnerabilities were discovered in `\js\player\dmplayer\play\index.php`. # Details We discovered that Seacms has very strict policies for front-end functionalities, frequently incorporati...
Reflected XSS Vulnerability in SeaCms V12.9
https://api.github.com/repos/HuaQiPro/seacms/issues/28/comments
1
2024-07-08T02:30:20Z
2024-07-29T02:25:08Z
https://github.com/HuaQiPro/seacms/issues/28
2,394,462,190
28
6,167
CVE-2024-36572
2024-07-30T20:15:03.630
Prototype pollution in allpro form-manager 0.7.4 allows attackers to run arbitrary code and cause other impacts via the functions setDefaults, mergeBranch, and Object.setObjectValue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://gist.github.com/mestrtee/1771ab4fba733ca898b6e2463dc6ed19" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/allpro/form-manager/issues/1" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:allpro:formmanager_data_handler:0.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "71E32868-786A-48EE-980B-A775C288255A", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "1321" ]
1321
https://github.com/allpro/form-manager/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "allpro", "form-manager" ]
## Overview The module is vulenrable via three functions: , located at `setDefaults (form-manager/cjs/index.js:1299)`, `mergeBranch (form-manager/cjs/index.js:1249)`, and `Object.setObjectValue (form-manager/cjs/index.js:1536)` respectively. In all these implementations, the assignment of the property from source ...
Prototype pollution vulnerability affecting form-manager@0.7.4
https://api.github.com/repos/allpro/form-manager/issues/1/comments
0
2024-03-14T20:10:37Z
2024-03-14T20:10:57Z
https://github.com/allpro/form-manager/issues/1
2,187,184,904
1
6,168
CVE-2024-7303
2024-07-31T08:15:02.780
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /request.php of the component Send Blood Request Page. The manipulation of the argument Address/bloodgroup leads to cross site scripting. The attack...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/cl4irv0yance/CVEs/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.273185" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": n...
[ "79" ]
79
https://github.com/cl4irv0yance/CVEs/issues/1
[ "Exploit" ]
github.com
[ "cl4irv0yance", "CVEs" ]
# Stored XSS in Online Blood Bank Management System V1.0 ### Affected Product Online Blood Bank Management System ### Vendor Homepage [https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/](https://itsourcecode.com/free-projects/php-project/online-...
ItSourceCode 'Online Blood Bank Management System in PHP" Stored XSS
https://api.github.com/repos/cl4irv0yance/CVEs/issues/1/comments
1
2024-07-25T19:35:24Z
2024-07-31T00:23:27Z
https://github.com/cl4irv0yance/CVEs/issues/1
2,430,853,526
1
6,169
CVE-2024-7311
2024-07-31T11:15:11.233
A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file register.php. The manipulation of the argument Email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the publi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/23588hk/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.273203" }, { "source": "cna@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_bus_reservation_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6370AED9-FA1C-4C5C-94A3-8DC8497337DD", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/23588hk/cve/issues/1
[ "Exploit" ]
github.com
[ "23588hk", "cve" ]
# code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 register.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Bus Reservation Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-bus-reservation-system-using-php-source-code/ # AFFECTED AND/OR FIXED V...
code-projects Online Bus Reservation Site Using PHP With Source Code v1.0 register.php SQL injection
https://api.github.com/repos/23588hk/cve/issues/1/comments
0
2024-07-30T13:55:21Z
2024-07-30T13:55:21Z
https://github.com/23588hk/cve/issues/1
2,437,906,687
1
6,170
CVE-2024-7320
2024-07-31T11:15:11.527
A vulnerability classified as critical has been found in itsourcecode Online Blood Bank Management System 1.0. This affects an unknown part of the file /admin/index.php of the component Admin Login. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/cl4irv0yance/CVEs/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.273231" }, { "source": "cna@vuldb.com", "tags": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": n...
[ "89" ]
89
https://github.com/cl4irv0yance/CVEs/issues/3
[ "Exploit" ]
github.com
[ "cl4irv0yance", "CVEs" ]
## Itsourcecode Online Blood Bank Management Authentication Bypass via SQL Injection to User page and Admin Console ### Affected Product Online Blood Bank Management System in PHP with Source Code ### Vendor Homepage [https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-p...
Itsourcecode Online Blood Bank Management Authentication Bypass via SQL Injection to User page and Admin Console
https://api.github.com/repos/cl4irv0yance/CVEs/issues/3/comments
0
2024-07-30T21:22:05Z
2024-07-31T15:28:09Z
https://github.com/cl4irv0yance/CVEs/issues/3
2,438,703,901
3
6,171
CVE-2024-7321
2024-07-31T12:15:02.027
A vulnerability classified as problematic was found in itsourcecode Online Blood Bank Management System 1.0. This vulnerability affects unknown code of the file signup.php of the component User Registration Handler. The manipulation of the argument user leads to cross site scripting. The attack can be initiated remotel...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/cl4irv0yance/CVEs/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.273232" }, { "source": "cna@vuldb.com", "tags": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B", "versionEndExcluding": null, "versionEndIncluding": n...
[ "79" ]
79
https://github.com/cl4irv0yance/CVEs/issues/4
[ "Exploit" ]
github.com
[ "cl4irv0yance", "CVEs" ]
# Stored XSS in Online Blood Bank Management System V1.0 ### Affected Product Online Blood Bank Management System ### Vendor Homepage [https://itsourcecode.com/free-projects/php-project/online-blood-bank-management-system-in-php-with-source-code/](https://itsourcecode.com/free-projects/php-project/online-...
ItSourceCode Stored XSS via User Registration
https://api.github.com/repos/cl4irv0yance/CVEs/issues/4/comments
0
2024-07-30T22:46:00Z
2024-07-30T22:46:01Z
https://github.com/cl4irv0yance/CVEs/issues/4
2,438,794,683
4
6,172
CVE-2024-7342
2024-08-01T05:15:10.303
A vulnerability was found in Baidu UEditor 1.4.3.3. It has been classified as problematic. This affects an unknown part of the file /ueditor/php/controller.php?action=uploadfile&encode=utf-8. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/62" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.273...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:baidu:ueditor:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5D0ADE2-CF30-42AB-8F6D-D5FAE3724C5B", "versionEndExcluding": null, "versionEndIncluding": "1.4.3.3", "versionStartExcludi...
[ "434" ]
434
https://github.com/Hebing123/cve/issues/62
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A stored cross-site scripting (XSS) vulnerability has been identified in UEditor version 1.4.3.3. The vulnerability stems from the default configuration of config.json files within the ≤1.4.3.3 versions of UEditor, which permits the uploading of `.swf` files. Furthermore, for versions ≥1.4.2 and ≤1.4.3.3, ...
Stored Cross-Site Scripting (XSS) Vulnerability in UEditor 1.4.3.3
https://api.github.com/repos/Hebing123/cve/issues/62/comments
1
2024-07-25T08:44:45Z
2024-08-01T08:21:13Z
https://github.com/Hebing123/cve/issues/62
2,429,393,116
62
6,173
CVE-2024-7343
2024-08-01T05:15:10.573
A vulnerability was found in Baidu UEditor 1.4.2. It has been declared as problematic. This vulnerability affects unknown code of the file /ueditor142/php/controller.php?action=catchimage. The manipulation of the argument source[] leads to cross site scripting. The attack can be initiated remotely. The exploit has been...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/63" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.273...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:baidu:ueditor:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "4283664F-A0E6-4ADD-B69A-CDD8B0190807", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/63
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A reflected cross-site scripting (XSS) vulnerability has been identified in the UEditor 1.4.2. This vulnerability permits an attacker to inject malicious scripts into web pages viewed by users, potentially compromising user data and session integrity. # Details The vulnerability exists in the `/ueditor/php...
Reflected XSS Vulnerability in UEditor 1.4.2
https://api.github.com/repos/Hebing123/cve/issues/63/comments
1
2024-07-25T11:45:34Z
2024-08-01T08:21:02Z
https://github.com/Hebing123/cve/issues/63
2,429,755,671
63
6,174
CVE-2024-7453
2024-08-04T05:16:09.523
A vulnerability was found in FastAdmin 1.5.0.20240328. It has been declared as problematic. This vulnerability affects unknown code of the file /[admins_url].php/general/attachment/edit/ids/4?dialog=1 of the component Attachment Management Section. The manipulation of the argument row[url]/row[imagewidth]/row[imageheig...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/65" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/6...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fastadmin:fastadmin:1.5.0.20240328:*:*:*:*:*:*:*", "matchCriteriaId": "C48F655F-EFFC-4DAE-88D9-BEABE6CD3EF7", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/65
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary > FastAdmin is a lightweight and efficient management background framework based on ThinkPHP. It is widely used for its simplicity and powerful features. FastAdmin 1.5.0.20240328, a version of the FastAdmin framework, contains a stored cross-site scripting (XSS) vulnerability in the backend's General M...
FastAdmin 1.5.0.20240328 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/65/comments
1
2024-08-01T08:27:51Z
2024-08-05T07:00:20Z
https://github.com/Hebing123/cve/issues/65
2,441,815,665
65
6,175
CVE-2024-7453
2024-08-04T05:16:09.523
A vulnerability was found in FastAdmin 1.5.0.20240328. It has been declared as problematic. This vulnerability affects unknown code of the file /[admins_url].php/general/attachment/edit/ids/4?dialog=1 of the component Attachment Management Section. The manipulation of the argument row[url]/row[imagewidth]/row[imageheig...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/65" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/6...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fastadmin:fastadmin:1.5.0.20240328:*:*:*:*:*:*:*", "matchCriteriaId": "C48F655F-EFFC-4DAE-88D9-BEABE6CD3EF7", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/66
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary > FastAdmin is a PHP backend development framework that is open-source under the Apache 2.0 license. It is designed for rapid development of backend systems, featuring a permission management system based on Auth verification, and offers a one-click generation of CRUD (Create, Read, Update, Delete) functiona...
FastAdmin 1.5.0.20240328 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/66/comments
1
2024-08-01T08:43:35Z
2024-08-05T07:00:31Z
https://github.com/Hebing123/cve/issues/66
2,441,849,243
66
6,176
CVE-2024-7455
2024-08-04T12:16:01.240
A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. This affects an unknown part of the file partedit.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/Wumshi/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuld...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system_project_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFACB1B0-0CF6-449D-84F4-1836B7BF6056", "versionEndExcluding": null, "versionEndIncludin...
[ "89" ]
89
https://github.com/Wumshi/cve/issues/3
[ "Exploit", "Technical Description", "Third Party Advisory" ]
github.com
[ "Wumshi", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 partedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-ph...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 partedit.php SQL injection
https://api.github.com/repos/Wumshi/cve/issues/3/comments
0
2024-08-03T15:45:51Z
2024-08-03T15:45:51Z
https://github.com/Wumshi/cve/issues/3
2,446,426,386
3
6,177
CVE-2024-7458
2024-08-04T22:15:50.837
A vulnerability was found in elunez eladmin up to 2.7 and classified as critical. This issue affects some unknown processing of the file /api/deploy/upload /api/database/upload of the component Database Management/Deployment Management. The manipulation of the argument file leads to path traversal: 'dir/../../filename'...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/elunez/eladmin/issues/851" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eladmin:eladmin:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C479E81-58DB-4E78-9175-C23E9FEEB7D3", "versionEndExcluding": null, "versionEndIncluding": "2.7", "versionStartExcluding...
[ "22" ]
22
https://github.com/elunez/eladmin/issues/851
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "elunez", "eladmin" ]
### **Description** Eladmin is a back-end management system with front-end and back-end separation based on Spring Boot 2.6.4, Spring Boot Jpa, JWT, Spring Security, Redis, and Vue Eladmin v2.7 has an arbitrary file upload vulnerability in the Database management and Deployment management Attackers can constru...
There exists an arbitrary file upload and delete vulnerability in the Database management and Deployment management
https://api.github.com/repos/elunez/eladmin/issues/851/comments
0
2024-07-26T03:08:57Z
2025-01-15T02:30:46Z
https://github.com/elunez/eladmin/issues/851
2,431,322,064
851
6,178
CVE-2024-7505
2024-08-06T04:16:47.857
A vulnerability, which was classified as critical, was found in itsourcecode Bike Delivery System 1.0. Affected is an unknown function of the file contact_us_action.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the publ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/56" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rainniar:bike_delivery_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BD21579-B575-4D3A-BDEB-B936103B4902", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "89" ]
89
https://github.com/CveSecLook/cve/issues/56
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Itsourcecode Bike Delivery System Source code Sample 1.0 contact_us_action.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bike Delivery System Source code Sample ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/bike-delivery-system-source-code-sample/ # AFFECTED AND/OR FIXED VERSION(S) ...
Itsourcecode Bike Delivery System Source code Sample 1.0 contact_us_action.php SQL injection
https://api.github.com/repos/CveSecLook/cve/issues/56/comments
0
2024-08-05T11:25:18Z
2024-08-05T11:25:18Z
https://github.com/CveSecLook/cve/issues/56
2,448,310,157
56
6,179
CVE-2024-7506
2024-08-06T05:15:41.413
A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /setlogo.php. The manipulation of the argument bgimg leads to unrestricted upload. The attack can be launched remotely. The exploit has been d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CveSecLook/cve/issues/57" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/CveSecLook/cve/issues/57
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CveSecLook", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code setlogo.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-book-store-project-in-php-with-source...
Itsourcecode Tailoring Management System Project In PHP With Source Code setlogo.php Unrestricted Upload
https://api.github.com/repos/CveSecLook/cve/issues/57/comments
0
2024-08-05T15:36:19Z
2024-08-05T15:36:19Z
https://github.com/CveSecLook/cve/issues/57
2,448,862,703
57
6,180
CVE-2024-42222
2024-08-07T08:16:12.473
In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data. Affected users ar...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3" }, { "source": "security@apache.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:cloudstack:4.19.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F28C1387-130B-4479-BE47-3CEBC3E92C5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "200" ]
200
https://github.com/apache/cloudstack/issues/9456
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "apache", "cloudstack" ]
<!-- Verify first that your issue/request is not already reported on GitHub. Also test if the latest release and main branch are affected too. Always add information AFTER of these HTML comments, but no need to delete the comments. --> ##### ISSUE TYPE <!-- Pick one below and delete the rest --> * Bug Report ...
ACS 4.19.1 | Full Network List visible for Domain Admin
https://api.github.com/repos/apache/cloudstack/issues/9456/comments
6
2024-07-26T11:06:04Z
2024-08-22T06:26:20Z
https://github.com/apache/cloudstack/issues/9456
2,431,997,510
9,456
6,181
CVE-2024-7635
2024-08-12T13:38:45.753
A vulnerability was found in code-projects Simple Ticket Booking 1.0. It has been classified as critical. Affected is an unknown function of the file register_insert.php of the component Registration Handler. The manipulation of the argument name/email/dob/password/Gender/phone leads to sql injection. It is possible to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/space-security/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:simple_ticket_booking:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D14B5958-44A0-40EB-A3EC-02065AFD7652", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/space-security/cve/issues/2
[ "Exploit", "Issue Tracking" ]
github.com
[ "space-security", "cve" ]
# code-projects Simple Ticket Booking In PHP With Source Code v1.0 register_insert.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Simple Ticket Booking In PHP With Source Code ## Vendor Homepage + https://code-projects.org/ticket-booking-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter ...
code-projects Simple Ticket Booking In PHP With Source Code v1.0 register_insert.php SQL injection
https://api.github.com/repos/space-security/cve/issues/2/comments
0
2024-08-06T12:33:38Z
2024-08-29T13:27:10Z
https://github.com/space-security/cve/issues/2
2,450,774,087
2
6,182
CVE-2024-7636
2024-08-12T13:38:46.037
A vulnerability was found in code-projects Simple Ticket Booking 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file authenticate.php of the component Login. The manipulation of the argument email/password leads to sql injection. The attack can be launched remot...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/space-security/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.274057" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:code-projects:simple_ticket_booking:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D14B5958-44A0-40EB-A3EC-02065AFD7652", "versionEndExcluding": null, "versionEndIncluding": null, "...
[ "89" ]
89
https://github.com/space-security/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "space-security", "cve" ]
# code-projects Simple Ticket Booking In PHP With Source Code v1.0 authenticate.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Simple Ticket Booking In PHP With Source Code ## Vendor Homepage + https://code-projects.org/ticket-booking-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + ...
code-projects Simple Ticket Booking In PHP With Source Code v1.0 authenticate.php SQL injection
https://api.github.com/repos/space-security/cve/issues/1/comments
0
2024-07-14T09:16:55Z
2024-08-29T13:28:10Z
https://github.com/space-security/cve/issues/1
2,407,343,173
1
6,183
CVE-2024-7637
2024-08-12T13:38:46.327
A vulnerability was found in code-projects Online Polling 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file registeracc.php of the component Registration. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit ha...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/space-security/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.274058" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:online_polling:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B4FF5D3-052E-4466-91FE-FF9418D00338", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "89" ]
89
https://github.com/space-security/cve/issues/3
[ "Exploit", "Issue Tracking" ]
github.com
[ "space-security", "cve" ]
# code-projects Online Polling Using PHP With Source Code v1.0 registeracc.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Polling Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/online-polling-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Liu Mingxua...
code-projects Online Polling Using PHP With Source Code v1.0 registeracc.php SQL injection
https://api.github.com/repos/space-security/cve/issues/3/comments
0
2024-08-07T02:19:13Z
2024-08-29T13:25:48Z
https://github.com/space-security/cve/issues/3
2,452,069,911
3
6,184
CVE-2024-7680
2024-08-12T13:38:55.060
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /incedit.php?id=4. The manipulation of the argument id/inccat/desc/date/amount leads to sql injection. It is possible to initiate the attack remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/chenzg22/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/chenzg22/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "chenzg22", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 incedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-wit...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 incedit.php SQL injection
https://api.github.com/repos/matias-a11y/cve/issues/1/comments
0
2024-08-11T07:14:33Z
2024-08-11T07:14:33Z
https://github.com/matias-a11y/cve/issues/1
2,459,461,351
1
6,185
CVE-2024-7681
2024-08-12T13:38:55.480
A vulnerability was found in code-projects College Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument email/password leads to sql injection. The attack can be initiated remotely. The exploit...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/space-security/cve/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:college_management_system_project:college_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3ADB4C9F-1230-4F3E-9E79-15F80FE25866", "versionEndExcluding": null, "versionEndIncludi...
[ "89" ]
89
https://github.com/space-security/cve/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "space-security", "cve" ]
# code-projects College Management System In PHP With Source Code v1.0 login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + College Management System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/college-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## s...
code-projects College Management System In PHP With Source Code v1.0 login.php SQL injection
https://api.github.com/repos/space-security/cve/issues/6/comments
0
2024-08-11T13:51:52Z
2024-08-29T13:21:16Z
https://github.com/space-security/cve/issues/6
2,459,603,423
6
6,186
CVE-2024-7682
2024-08-12T13:38:55.913
A vulnerability was found in code-projects Job Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file rw_i_nat.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/space-security/cve/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vul...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "43FB0433-4530-4F0A-A88F-B017F5DD72F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/space-security/cve/issues/7
[ "Exploit", "Issue Tracking" ]
github.com
[ "space-security", "cve" ]
# code-projects Job Portal Using PHP With Source Code v1.0 rw_i_nat.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Job Portal Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/job-portal-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + Liu Mingxuan, Liu Hang ##...
code-projects Job Portal Using PHP With Source Code v1.0 rw_i_nat.php SQL injection
https://api.github.com/repos/space-security/cve/issues/7/comments
0
2024-08-11T13:58:35Z
2024-08-29T13:13:43Z
https://github.com/space-security/cve/issues/7
2,459,605,800
7
6,187
CVE-2024-21550
2024-08-12T15:15:19.903
SteVe is an open platform that implements different version of the OCPP protocol for Electric Vehicle charge points, acting as a central server for management of registered charge points. Attackers can inject arbitrary HTML and Javascript code via WebSockets leading to persistent Cross-Site Scripting in the SteVe manag...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "report@snyk.io", "tags": [ "Product" ], "url": "https://github.com/steve-community/steve/blob/steve-3.6.0/src/main/java/de/rwth/idsg/steve/config/WebSocketConfiguration.java#L69" }, { "source": "report@snyk.io", "tags": [ "Patch" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:steve-community:steve:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA3142CE-5549-4BED-8B4C-01ECF77B9E0F", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartE...
[ "79" ]
79
https://github.com/steve-community/steve/issues/1526
[ "Issue Tracking", "Patch" ]
github.com
[ "steve-community", "steve" ]
#### Checklist - [x] I checked other issues already, but found no answer/solution - [x] I checked the documentation and wiki, but found no answer/solution - [x] I am running the latest version and the issue still occurs - [x] I am sure that this issue is about SteVe (and not about the charging station software or...
Validate chargeBoxId for WS connections
https://api.github.com/repos/steve-community/steve/issues/1526/comments
4
2024-08-01T16:55:48Z
2024-08-04T08:54:25Z
https://github.com/steve-community/steve/issues/1526
2,442,929,562
1,526
6,188
CVE-2024-7794
2024-08-14T21:15:17.817
A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file mybill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the publ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ppp-src/ha/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.274562" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adrianmercurio:vehicle_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "01988E3D-47DA-45BA-97FC-E6EDD88177DB", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/ha/issues/5
[ "Exploit", "Issue Tracking" ]
github.com
[ "ppp-src", "ha" ]
# Itsourcecode Vehicle Management System Project in PHP 1.0 mybill.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Vehicle Management System Project in PHP Free Download ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/vehicle-management-system-project-in-php-free-download/ # AFFECTED AND...
Itsourcecode Vehicle Management System Project in PHP 1.0 mybill.php SQL injection
https://api.github.com/repos/ppp-src/ha/issues/5/comments
0
2024-08-13T02:18:38Z
2024-08-13T02:18:38Z
https://github.com/ppp-src/ha/issues/5
2,462,232,866
5
6,189
CVE-2024-7808
2024-08-15T01:15:12.150
A vulnerability was found in code-projects Job Portal 1.0. It has been classified as critical. Affected is an unknown function of the file logindbc.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be us...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/XYgit-99/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.274704" }, { "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "43FB0433-4530-4F0A-A88F-B017F5DD72F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/XYgit-99/cve/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "XYgit-99", "cve" ]
# code-projects Job Portal Using PHP With Source Code v1.0 logindbc.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Job Portal Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/job-portal-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + carbonCircle ## Vulnerabl...
code-projects Job Portal Using PHP With Source Code v1.0 logindbc.php SQL injection
https://api.github.com/repos/XYgit-99/cve/issues/1/comments
0
2024-08-13T15:10:41Z
2024-08-13T15:10:41Z
https://github.com/XYgit-99/cve/issues/1
2,463,597,537
1
6,190
CVE-2024-42681
2024-08-15T17:15:18.303
Insecure Permissions vulnerability in xxl-job v.2.4.1 allows a remote attacker to execute arbitrary code via the Sub-Task ID component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3516" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "C90A77A0-C0DF-4EEB-AB59-EFAEBCFFE60B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "276" ]
276
https://github.com/xuxueli/xxl-job/issues/3516
[ "Exploit", "Issue Tracking" ]
github.com
[ "xuxueli", "xxl-job" ]
XXL-JOB Version: 2.4.1 Expected Behavior: Users should only be able to see and execute tasks on the executors they are assigned to. Ordinary users should not be able to see or execute tasks on executors they are not assigned to. Actual Behavior: In version 2.4.1, even though an ordinary user is not assigned to...
XXL-JOB 2.4.1 Permission Issue: Ordinary Users Can Indirectly Execute Tasks of Unassigned Executors via Sub-Task IDs
https://api.github.com/repos/xuxueli/xxl-job/issues/3516/comments
1
2024-07-23T03:09:28Z
2024-11-10T11:33:28Z
https://github.com/xuxueli/xxl-job/issues/3516
2,424,146,540
3,516
6,191
CVE-2024-42843
2024-08-15T17:15:18.400
Projectworlds Online Examination System v1.0 is vulnerable to SQL Injection via the subject parameter in feed.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ganzhi-qcy/cve/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_examination_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "32029B59-C9C3-4474-8BF6-D5A0410EB748", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ganzhi-qcy/cve/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ganzhi-qcy", "cve" ]
# projectworlds Online Examination System Project in Php v1.0 feed.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Examination System Project in Php ## Vendor Homepage + https://projectworlds.in/free-projects/php-projects/online-examination/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + quchunyi,yaomingjun...
projectworlds Online Examination System Project in Php v1.0 feed.php SQL injection
https://api.github.com/repos/ganzhi-qcy/cve/issues/6/comments
0
2024-07-26T13:36:37Z
2025-03-06T01:28:07Z
https://github.com/ganzhi-qcy/cve/issues/6
2,432,260,063
6
6,192
CVE-2024-7838
2024-08-15T20:15:18.457
A vulnerability was found in itsourcecode Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /addcategory.php. The manipulation of the argument cname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ppp-src/a/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.274742" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E6AA4AA-216E-471B-9107-65E50C880042", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/a/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "ppp-src", "a" ]
# Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "category.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Online Food Ordering System Project in PHP with Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/online-food-ordering-system-source-code/ # AFFECTED AND/...
Itsourcecode "Online Food Ordering System Project " in PHP 1.0 "category.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/1/comments
0
2024-08-15T00:21:11Z
2024-08-15T00:21:11Z
https://github.com/ppp-src/a/issues/1
2,467,031,541
1
6,193
CVE-2024-7839
2024-08-15T21:15:18.237
A vulnerability classified as critical has been found in itsourcecode Billing System 1.0. This affects an unknown part of the file addbill.php. The manipulation of the argument owners_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/ppp-src/a/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.274743" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:billing_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6AB542E-F5A5-4637-8D8D-E45F0ED68384", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/ppp-src/a/issues/2
[ "Exploit" ]
github.com
[ "ppp-src", "a" ]
# Itsourcecode "Billing System" in PHP 1.0 "addbill.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Billing System In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + wudongG ...
Itsourcecode "Billing System" in PHP 1.0 "addbill.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/2/comments
0
2024-08-15T00:36:04Z
2024-08-15T00:36:04Z
https://github.com/ppp-src/a/issues/2
2,467,055,446
2
6,194
CVE-2024-7913
2024-08-18T22:15:12.480
A vulnerability was found in itsourcecode Billing System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /addclient1.php. The manipulation of the argument lname/fname/mi/address/contact/meterReader leads to sql injection. The attack may be initiated remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ppp-src/a/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.275039" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:billing_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6AB542E-F5A5-4637-8D8D-E45F0ED68384", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/ppp-src/a/issues/4
[ "Exploit", "Issue Tracking" ]
github.com
[ "ppp-src", "a" ]
# Itsourcecode "Billing System " in PHP 1.0 "addclient1.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Billing System In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/billing-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xxxx ...
Itsourcecode "Billing System " in PHP 1.0 "addclient1.php" SQL injection
https://api.github.com/repos/ppp-src/a/issues/4/comments
0
2024-08-15T15:03:58Z
2024-08-15T15:03:58Z
https://github.com/ppp-src/a/issues/4
2,468,258,395
4
6,195
CVE-2024-44076
2024-08-19T03:15:03.883
In Microcks before 1.10.0, the POST /api/import and POST /api/export endpoints allow non-administrator access.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/microcks/microcks/compare/1.9.1-fix-1...1.10.0" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/microcks/microcks/issues/1212...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microcks:microcks:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0B7DBDB-CA72-4351-A85C-47EBEB5D0AE5", "versionEndExcluding": "1.10.0", "versionEndIncluding": null, "versionStartExcl...
[ "269" ]
269
https://github.com/microcks/microcks/issues/1212
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "microcks", "microcks" ]
### Describe the bug The `POST /api/import` and `POST /api/export` endpoints should be secured and allowed to administrator only. ### Expected behavior When calling the API in unauthenticated mode or with a token corresponding to a manager role, we should receive an error `401` ### Actual behavior The API call are...
Snapshot import and export endpoints are unsecured
https://api.github.com/repos/microcks/microcks/issues/1212/comments
0
2024-06-14T12:20:03Z
2024-06-14T14:00:54Z
https://github.com/microcks/microcks/issues/1212
2,353,253,534
1,212
6,196
CVE-2024-43380
2024-08-19T15:15:08.893
fugit contains time tools for flor and the floraison group. The fugit "natural" parser, that turns "every wednesday at 5pm" into "0 17 * * 3", accepted any length of input and went on attempting to parse it, not returning promptly, as expected. The parse call could hold the thread with no end in sight. Fugit dependents...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/floraison/fugit/commit/ad2c1c9c737213d585fff0b51c927d178b2c05a5" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:floraison:fugit:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "7FA5151C-7CD2-4FC9-B141-F5BF715E5592", "versionEndExcluding": "1.11.1", "versionEndIncluding": null, "versionStartExc...
[ "400" ]
400
https://github.com/floraison/fugit/issues/104
[ "Issue Tracking", "Patch" ]
github.com
[ "floraison", "fugit" ]
## Issue description Hi! I fuzzed this library with afl and found that the program hangs with a crafted input. I originally reported this privately, but it was later decided to create a public issue. I am going to paste my email text here: > Hi! > > I decided to report this to you privately, because this...
Poor time complexity of Cron.parse
https://api.github.com/repos/floraison/fugit/issues/104/comments
3
2024-08-14T07:15:05Z
2024-08-16T01:09:39Z
https://github.com/floraison/fugit/issues/104
2,465,079,224
104
6,197