cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2024-52613
2024-11-14T23:15:05.967
A heap-based buffer under-read in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) via a crafted MOV video file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/justdan96/tsMuxer/issues/881" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:justdan96:tsmuxer:nightly-2024-05-12-02-01-18:*:*:*:*:*:*:*", "matchCriteriaId": "518BE04B-2D5E-4617-95D9-AF476CEAB9B3", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "125" ]
125
https://github.com/justdan96/tsMuxer/issues/881
[ "Exploit", "Issue Tracking" ]
github.com
[ "justdan96", "tsMuxer" ]
We found heap buffer under-read in movDemuxer.cpp in the current master([cb04552](https://github.com/justdan96/tsMuxer/commit/cb0455259bb9182fba466a4905b840fed3a72646)). This vulnerability was discovered during the analysis of a fuzzing crash caused by a different root cause. PoC is here. 15-b.mov is in [vuln-b....
heap buffer under-read is found in movDemuxer.cpp
https://api.github.com/repos/justdan96/tsMuxer/issues/881/comments
0
2024-06-05T10:48:37Z
2024-11-15T20:48:16Z
https://github.com/justdan96/tsMuxer/issues/881
2,335,562,970
881
6,399
CVE-2024-11256
2024-11-15T20:15:17.957
A vulnerability was found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the publ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/8" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 100projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /login.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Portfolio Management System MCA Project using PHP and MySQL ## Vendor Homepage + https://1000projects.org/portfolio-management-system-mca-project-using-php-and-mysql.html # AFFECT...
100projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /login.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/8/comments
0
2024-11-13T15:28:48Z
2024-11-13T15:28:48Z
https://github.com/Hacker0xOne/CVE/issues/8
2,655,878,252
8
6,400
CVE-2024-11257
2024-11-15T20:15:18.253
A vulnerability classified as critical has been found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/forgot-password.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/10" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/forgot-password.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/O...
1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/forgot-password.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/10/comments
0
2024-11-13T15:44:08Z
2024-11-13T15:44:10Z
https://github.com/Hacker0xOne/CVE/issues/10
2,655,936,915
10
6,401
CVE-2024-11258
2024-11-15T20:15:18.523
A vulnerability classified as critical was found in 1000 Projects Beauty Parlour Management System 1.0. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the publ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/11" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR FIXED VER...
100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/index.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/11/comments
0
2024-11-13T15:46:44Z
2024-11-13T15:46:44Z
https://github.com/Hacker0xOne/CVE/issues/11
2,655,946,469
11
6,402
CVE-2024-11261
2024-11-15T22:15:14.970
A vulnerability, which was classified as critical, was found in SourceCodester Student Record Management System 1.0. Affected is an unknown function of the file StudentRecordManagementSystem.cpp of the component Number of Students Menu. The manipulation leads to memory corruption. Attacking locally is a requirement. Th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/12" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "119" ]
119
https://github.com/Hacker0xone/CVE/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# **SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Validation Vulnerability** ## **Vulnerability Name** + **Input Validation Vulnerability** ## **Vulnerability Description** In the Student Record Management System program, improper input validation allows for unexpected beh...
SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Validation Vulnerability
https://api.github.com/repos/Hacker0xOne/CVE/issues/12/comments
0
2024-11-14T01:43:13Z
2024-11-14T08:34:54Z
https://github.com/Hacker0xOne/CVE/issues/12
2,657,271,678
12
6,403
CVE-2024-11262
2024-11-15T23:15:10.270
A vulnerability has been found in SourceCodester Student Record Management System 1.0 and classified as critical. Affected by this vulnerability is the function main of the component View All Student Marks. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/13" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.284719" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/Hacker0xone/CVE/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# **Student Record Management System in C++ with Source Code V1.0 - Stack-based Buffer Overflow Vulnerabilities** **Project Name:** Student Record Management System in C++ **Vulnerability Name:** Stack-based Buffer Overflow Vulnerabilities **Vulnerability Type:** Buffer Overflow **Severity Level:** High ...
Student Record Management System in C++ with Source Code V1.0 - Stack-based Buffer Overflow Vulnerabilities
https://api.github.com/repos/Hacker0xOne/CVE/issues/13/comments
0
2024-11-14T08:37:09Z
2024-11-14T08:39:40Z
https://github.com/Hacker0xOne/CVE/issues/13
2,658,025,307
13
6,404
CVE-2024-52762
2024-11-19T21:15:06.580
A cross-site scripting (XSS) vulnerability in the component /master/header.php of Ganglia-web v3.73 to v3.76 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "tz" parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ganglia/ganglia-web/issues/382" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7E7806B-9443-4250-A789-F980E207AC13", "versionEndExcluding": null, "versionEndIncluding": "3.76", "versionStartExcl...
[ "79" ]
79
https://github.com/ganglia/ganglia-web/issues/382
[ "Exploit", "Issue Tracking" ]
github.com
[ "ganglia", "ganglia-web" ]
The first XSS release: 3.73<=Ganglia-web<3.75 Vulnerability cause: https://github.com/ganglia/ganglia-web/blob/3.7.3/graph_all_periods.php The parameters passed in are not restricted, and the trigger point is the parameter g. <img width="979" alt="Snipaste_2024-11-07_21-11-39" src="https://github.com/user-attach...
There are two xss in different version ranges
https://api.github.com/repos/ganglia/ganglia-web/issues/382/comments
0
2024-11-07T13:15:32Z
2024-11-07T13:15:32Z
https://github.com/ganglia/ganglia-web/issues/382
2,641,005,144
382
6,405
CVE-2024-11488
2024-11-20T17:15:14.097
A vulnerability was found in 115cms up to 20240807 and classified as problematic. This issue affects some unknown processing of the file /app/admin/view/web_user.html. The manipulation of the argument ks leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/70" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.285503" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:115cms:115cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "03950909-1057-4645-B3D9-0592C6550912", "versionEndExcluding": null, "versionEndIncluding": "2024-08-07", "versionStartExcl...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/70
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary 115cms v8 version 20240807 is affected by multiple reflected Cross-Site Scripting (XSS) vulnerabilities. These vulnerabilities occur due to insufficient input validation and sanitation, allowing attackers to inject malicious scripts into web pages that are then executed in the browsers of other users. http...
Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in 115cms v8 20240807
https://api.github.com/repos/Hebing123/cve/issues/70/comments
1
2024-09-05T06:15:05Z
2024-11-21T09:32:15Z
https://github.com/Hebing123/cve/issues/70
2,506,863,968
70
6,406
CVE-2024-11587
2024-11-21T13:15:03.803
A vulnerability was found in idcCMS 1.60. It has been classified as problematic. This affects the function GetCityOptionJs of the file /inc/classProvCity.php. The manipulation of the argument idName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the publ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/75" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.285657" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:idccms:idccms:1.60:*:*:*:*:*:*:*", "matchCriteriaId": "EDEAEBA4-6D6F-466A-805A-4CA739290434", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/75
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A reflected Cross Site Scripting (XSS) vulnerability exists in idcCMS V1.60 due to improper sanitization of the $idName parameter in `/inc/classProvCity.php`. # Details idcCMS V1.60 suffers from a Reflected Cross Site Scripting (XSS) vulnerability due to improper sanitization of the $idName parameter wit...
idcCMS V1.60 has a reflected XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/75/comments
1
2024-11-12T11:32:29Z
2024-11-21T09:26:12Z
https://github.com/Hebing123/cve/issues/75
2,651,919,647
75
6,407
CVE-2024-11588
2024-11-21T13:15:06.013
A vulnerability was found in AVL-DiTEST-DiagDev libdoip 1.0.0. It has been rated as problematic. This issue affects the function DoIPConnection::reactOnReceivedTcpMessage of the file DoIPConnection.cpp. The manipulation leads to null pointer dereference.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/AVL-DiTEST-DiagDev/libdoip/issues/11" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ct...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avlditest:libdoip:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7243300-7B16-4672-BEA9-C4AA3D9A699E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "476" ]
476
https://github.com/AVL-DiTEST-DiagDev/libdoip/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "AVL-DiTEST-DiagDev", "libdoip" ]
In the reactOnReceivedTcpMessage method, the ROUTINGACTIVATIONREQUEST activation command dynamically allocates an array to routedClientAddress. However, when the activation command is not used and a diagnostic command (8001) is sent directly, routedClientAddress is not allocated. If it is used afterward, it causes the ...
Null Pointer Vulnerability
https://api.github.com/repos/AVL-DiTEST-DiagDev/libdoip/issues/11/comments
1
2024-11-13T06:16:47Z
2024-11-13T06:17:47Z
https://github.com/AVL-DiTEST-DiagDev/libdoip/issues/11
2,654,338,896
11
6,408
CVE-2024-11589
2024-11-21T13:15:06.250
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /expcatedit.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kevin27392/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/kevin27392/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kevin27392", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expcatedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expcatedit.php SQL injection
https://api.github.com/repos/kevin27392/cve/issues/1/comments
0
2024-11-16T04:39:52Z
2024-11-16T04:39:52Z
https://github.com/kevin27392/cve/issues/1
2,663,750,316
1
6,409
CVE-2024-11590
2024-11-21T13:15:06.480
A vulnerability, which was classified as critical, has been found in 1000 Projects Bookstore Management System 1.0. Affected by this issue is some unknown functionality of the file /forget_password_process.php. The manipulation of the argument unm leads to sql injection. The attack may be launched remotely. The exploit...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/1ighttack/CVE/issues/1" }, { "source": "cna@vuldb.com", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/1ighttack/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "1ighttack", "CVE" ]
# 100projects Bookstore Management System PHP MySQL Project V1.0 forget_password_process.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Bookstore Management System PHP MySQL Project ## Vendor Homepage + https://1000projects.org/bookstore-management-system-php-mysql-project.html # AFFECTED AND/OR FIXED VERSION(S...
100projects Bookstore Management System PHP MySQL Project V1.0 forget_password_process.php SQL injection
https://api.github.com/repos/1ighttack/CVE/issues/1/comments
0
2024-11-16T05:40:42Z
2024-11-16T05:40:42Z
https://github.com/1ighttack/CVE/issues/1
2,663,852,164
1
6,410
CVE-2024-11591
2024-11-21T14:15:08.713
A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument sername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/14" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-services.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR F...
1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-services.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/14/comments
0
2024-11-16T14:03:31Z
2024-11-16T14:03:32Z
https://github.com/Hacker0xOne/CVE/issues/14
2,664,404,665
14
6,411
CVE-2024-11592
2024-11-21T15:15:25.003
A vulnerability has been found in 1000 Projects Beauty Parlour Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/about-us.php. The manipulation of the argument pagetitle leads to sql injection. The attack can be initiated remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/15" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/about-us.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR FIXED...
100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/about-us.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/15/comments
0
2024-11-16T14:09:11Z
2024-11-16T14:09:11Z
https://github.com/Hacker0xOne/CVE/issues/15
2,664,412,163
15
6,412
CVE-2024-11631
2024-11-23T12:15:19.760
A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /expedit.php. The manipulation of the argument expcat leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public an...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sil3n/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "tags...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/sil3n/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sil3n", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expedit.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-w...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expedit.php SQL injection
https://api.github.com/repos/sil3n/cve/issues/1/comments
0
2024-11-18T02:03:49Z
2024-11-18T02:03:50Z
https://github.com/sil3n/cve/issues/1
2,666,853,834
1
6,413
CVE-2023-7299
2024-11-23T13:15:04.547
A vulnerability was found in DataGear up to 4.60. It has been declared as critical. This vulnerability affects unknown code of the file /dataSet/resolveSql. The manipulation of the argument sql leads to sql injection. The attack can be initiated remotely. Upgrading to version 4.7.0 is able to address this issue. It is ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/datageartech/datagear/issues/29" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.285658" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:datagear:datagear:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E21B63E-035C-4D02-AF6A-0093D5407D1B", "versionEndExcluding": "4.7.0", "versionEndIncluding": null, "versionStartExclu...
[ "89" ]
89
https://github.com/datageartech/datagear/issues/29
[ "Exploit" ]
github.com
[ "datageartech", "datagear" ]
The /dataSet/resolveSql interface sql parameters can be template injected, resulting in rce. just like: ![rce](https://github.com/datageartech/datagear/assets/49425165/45db9004-7c10-4ddf-a631-085cd8df41b8)
/dataSet/resolveSql interface freemarker template injection vulnerability
https://api.github.com/repos/datageartech/datagear/issues/29/comments
1
2023-09-22T10:26:10Z
2024-01-03T12:10:14Z
https://github.com/datageartech/datagear/issues/29
1,908,639,829
29
6,414
CVE-2024-11632
2024-11-23T14:15:17.880
A vulnerability was found in code-projects Simple Car Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file /book_car.php. The manipulation of the argument fname/id_no/gender/email/phone/location leads to sql injection. It is possible to launch the attack remotely. The explo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sil3n/cve/issues/2" }, { "source": "cna@vuldb.com", "tag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D80D0581-09FD-4CE1-9327-CF580DF49354", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/sil3n/cve/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sil3n", "cve" ]
# code-projects Simple Car Rental System In PHP With Source Code v1.0 book_car.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Restaurant Order System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/simple-car-rental-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ##...
code-projects Simple Car Rental System In PHP With Source Code v1.0 book_car.php SQL injection
https://api.github.com/repos/sil3n/cve/issues/2/comments
0
2024-11-18T02:05:39Z
2024-11-18T02:05:39Z
https://github.com/sil3n/cve/issues/2
2,666,855,479
2
6,415
CVE-2024-53899
2024-11-24T16:15:06.647
virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/pypa/virtualenv/issues/2768" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/pypa/virtualenv/pull/2771" }, { "source": "cve@mitre.org", "tags": [...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:virtualenv:virtualenv:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF06C282-558B-4BD3-9260-61E491A730EC", "versionEndExcluding": "20.26.6", "versionEndIncluding": null, "versionStar...
[ "77" ]
77
https://github.com/pypa/virtualenv/issues/2768
[ "Exploit" ]
github.com
[ "pypa", "virtualenv" ]
**Issue** This issue was originally reported to Tidelift, with disclosure negotiated with the maintainer. The activation script in `virtualenv` is command injectable via a crafted path: ```bash envname="';uname -a;':" mkdir "$envname" cd "$envname" virtualenv . . ./bin/activate ``` ``` Linux archlinu...
Command injection is possible via activation script
https://api.github.com/repos/pypa/virtualenv/issues/2768/comments
0
2024-09-23T14:27:10Z
2024-09-27T16:16:10Z
https://github.com/pypa/virtualenv/issues/2768
2,542,843,653
2,768
6,416
CVE-2024-11646
2024-11-25T00:15:03.743
A vulnerability classified as critical was found in 1000 Projects Beauty Parlour Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit-services.php. The manipulation of the argument sername leads to sql injection. The attack can be launched remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/33" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/33
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-services.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR F...
100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-services.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/33/comments
0
2024-11-18T11:54:46Z
2024-11-18T11:54:46Z
https://github.com/ppp-src/CVE/issues/33
2,668,312,231
33
6,417
CVE-2024-11647
2024-11-25T01:15:04.033
A vulnerability, which was classified as critical, has been found in 1000 Projects Beauty Parlour Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. The manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ppp-src/CVE/issues/34" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/ppp-src/CVE/issues/34
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ppp-src", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/view-appointment.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/...
1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/view-appointment.php SQL injection
https://api.github.com/repos/ppp-src/CVE/issues/34/comments
0
2024-11-18T11:58:53Z
2024-11-18T11:58:53Z
https://github.com/ppp-src/CVE/issues/34
2,668,322,809
34
6,418
CVE-2024-11648
2024-11-25T01:15:04.687
A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-customer.php. The manipulation of the argument name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclos...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Calmgh/CVE/issues/1" }, { "source": "cna@vuldb.com", "tag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Calmgh/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Calmgh", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-customer.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED AND/OR F...
1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-customer.php SQL injection
https://api.github.com/repos/Calmgh/CVE/issues/1/comments
0
2024-11-19T07:16:42Z
2024-11-19T07:16:43Z
https://github.com/Calmgh/CVE/issues/1
2,671,046,129
1
6,419
CVE-2024-11649
2024-11-25T02:15:15.883
A vulnerability has been found in 1000 Projects Beauty Parlour Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/search-appointment.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zgaz/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/zgaz/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "zgaz", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-appointment.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html # AFFECTED A...
1000projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-appointment.php SQL injection
https://api.github.com/repos/zgaz/CVE/issues/1/comments
0
2024-11-23T12:14:41Z
2024-11-23T12:14:41Z
https://github.com/zgaz/CVE/issues/1
2,685,929,304
1
6,420
CVE-2024-11661
2024-11-25T08:15:09.007
A vulnerability was found in Codezips Free Exam Hall Seating Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file profile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. The attack can be initiate...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anqi12301/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.285982" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131", "versionEndExcluding": null, "versionEndIncluding": null,...
[ "434" ]
434
https://github.com/anqi12301/CVE/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anqi12301", "CVE" ]
# Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 profile.php Unrestricted Upload # NAME OF AFFECTED PRODUCT(S) + Free Exam Hall Seating Management System In PHP with Source Code ## Vendor Homepage + https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-source-c...
Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 profile.php Unrestricted Upload
https://api.github.com/repos/anqi12301/CVE/issues/1/comments
0
2024-11-19T03:56:51Z
2024-11-19T03:56:51Z
https://github.com/anqi12301/CVE/issues/1
2,670,648,707
1
6,421
CVE-2024-11663
2024-11-25T09:15:06.590
A vulnerability classified as critical was found in Codezips E-Commerce Site 1.0. Affected by this vulnerability is an unknown functionality of the file search.php. The manipulation of the argument keywords leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/disinroot/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.285985" }, { "source": "cn...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "89" ]
89
https://github.com/disinroot/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "disinroot", "CVE" ]
# Codezips E-commerce Site Using PHP With Source Code V1.0 search.php SQL injection # NAME OF AFFECTED PRODUCT(S) + E-commerce Site Using PHP With Source Code ## Vendor Homepage + https://codezips.com/php/e-commerce-site-using-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + xiongdaicheng ...
Codezips E-commerce Site Using PHP With Source Code V1.0 search.php SQL injection
https://api.github.com/repos/disinroot/CVE/issues/1/comments
0
2024-11-19T07:38:15Z
2024-11-19T07:40:25Z
https://github.com/disinroot/CVE/issues/1
2,671,125,449
1
6,422
CVE-2024-11673
2024-11-25T23:15:04.280
A vulnerability, which was classified as problematic, has been found in 1000 Projects Bookstore Management System 1.0. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/16" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "352" ]
352
https://github.com/Hacker0xone/CVE/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# **Vulnerability Report** + **1000projects Bookstore Management System PHP MySQL Project V1.0 - Cross-Site Request Forgery (CSRF)** ## **Vulnerability Name** + Cross-Site Request Forgery (CSRF) ## **Basic Information** - **Target System**: Bookstore Management System - **Tested Parameter**: `s` + *...
1000projects Bookstore Management System PHP MySQL Project V1.0 - Cross-Site Request Forgery (CSRF)
https://api.github.com/repos/Hacker0xOne/CVE/issues/16/comments
0
2024-11-20T03:42:49Z
2024-11-20T03:42:49Z
https://github.com/Hacker0xOne/CVE/issues/16
2,674,235,113
16
6,423
CVE-2024-11744
2024-11-26T21:15:06.483
A vulnerability has been found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been di...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zdwf-klm/CVE/issues/1" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/zdwf-klm/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "zdwf-klm", "CVE" ]
# 1000projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /register.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Portfolio Management System MCA Project using PHP and MySQL ## Vendor Homepage + https://1000projects.org/portfolio-management-system-mca-project-using-php-and-mysql.html # AF...
1000projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /register.php SQL injection
https://api.github.com/repos/zdwf-klm/CVE/issues/1/comments
0
2024-11-22T02:16:04Z
2024-11-22T02:16:04Z
https://github.com/zdwf-klm/CVE/issues/1
2,681,536,616
1
6,424
CVE-2024-11817
2024-11-26T23:15:04.990
A vulnerability was found in PHPGurukul User Registration & Login and User Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The e...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wackymaker/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://phpgurukul.com/" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48F8CEA-7E27-491E-8C39-4898F0AE4432", "versionEndExcluding": null, "versionEndI...
[ "89" ]
89
https://github.com/wackymaker/CVE/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wackymaker", "CVE" ]
# Phpgurukul User Registration & Login and User Management System With admin panel V1.0 /admin/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + User Registration & Login and User Management System With admin panel ## Vendor Homepage + https://phpgurukul.com/user-registration-login-and-user-management-system-...
Phpgurukul User Registration & Login and User Management System With admin panel V1.0 /admin/index.php SQL injection
https://api.github.com/repos/wackymaker/CVE/issues/1/comments
0
2024-11-24T06:54:43Z
2024-11-24T06:54:43Z
https://github.com/wackymaker/CVE/issues/1
2,687,247,188
1
6,425
CVE-2024-11818
2024-11-27T00:15:17.727
A vulnerability classified as critical has been found in PHPGurukul User Registration & Login and User Management System 1.0. This affects an unknown part of the file /signup.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wackymaker/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://phpgurukul.com/" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48F8CEA-7E27-491E-8C39-4898F0AE4432", "versionEndExcluding": null, "versionEndI...
[ "89" ]
89
https://github.com/wackymaker/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wackymaker", "CVE" ]
# Phpgurukul User Registration & Login and User Management System With admin panel V1.0 /signup.php SQL injection # NAME OF AFFECTED PRODUCT(S) + User Registration & Login and User Management System With admin panel ## Vendor Homepage + https://phpgurukul.com/user-registration-login-and-user-management-system-with-...
Phpgurukul User Registration & Login and User Management System With admin panel V1.0 /signup.php SQL injection
https://api.github.com/repos/wackymaker/CVE/issues/3/comments
0
2024-11-24T07:38:18Z
2024-11-24T07:38:18Z
https://github.com/wackymaker/CVE/issues/3
2,687,310,551
3
6,426
CVE-2024-11819
2024-11-27T00:15:17.890
A vulnerability classified as critical was found in 1000 Projects Portfolio Management System MCA 1.0. This vulnerability affects unknown code of the file /forgot_password_process.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wackymaker/CVE/issues/2" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/wackymaker/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wackymaker", "CVE" ]
# 1000projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /forgot_password_process.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Portfolio Management System MCA Project using PHP and MySQL ## Vendor Homepage + https://1000projects.org/portfolio-management-system-mca-project-using-php-and-m...
1000projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /forgot_password_process.php SQL injection
https://api.github.com/repos/wackymaker/CVE/issues/2/comments
0
2024-11-24T06:58:23Z
2024-11-24T06:58:23Z
https://github.com/wackymaker/CVE/issues/2
2,687,249,859
2
6,427
CVE-2024-11962
2024-11-28T16:15:06.307
A vulnerability classified as critical was found in code-projects Simple Car Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/w0r1dtr33/cve/issues/1" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D80D0581-09FD-4CE1-9327-CF580DF49354", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/w0r1dtr33/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "w0r1dtr33", "cve" ]
# code-projects Simple Car Rental System In PHP With Source Code v1.0 login.php SQL injection # usernameOF AFFECTED PRODUCT(S) + Restaurant Order System In PHP With Source Code ## Vendor Homepage + https://code-projects.org/simple-car-rental-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## su...
code-projects Simple Car Rental System In PHP With Source Code v1.0 login.php SQL injection
https://api.github.com/repos/w0r1dtr33/cve/issues/1/comments
0
2024-11-18T01:56:11Z
2024-11-26T02:39:13Z
https://github.com/w0r1dtr33/cve/issues/1
2,666,846,797
1
6,428
CVE-2024-11963
2024-11-28T16:15:06.993
A vulnerability, which was classified as critical, has been found in code-projects Responsive Hotel Site 1.0. Affected by this issue is some unknown functionality of the file /admin/room.php. The manipulation of the argument troom leads to sql injection. The attack may be launched remotely. The exploit has been disclos...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/w0r1dtr33/cve/issues/2" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/w0r1dtr33/cve/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "w0r1dtr33", "cve" ]
# code-projects Responsive Hotel Site Using PHP With Source Code v1.0 room.php SQL injection # troom OF AFFECTED PRODUCT(S) + Responsive Hotel Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/responsive-hotel-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter...
code-projects Responsive Hotel Site Using PHP With Source Code v1.0 room.php SQL injection
https://api.github.com/repos/w0r1dtr33/cve/issues/2/comments
0
2024-11-18T01:59:25Z
2024-11-26T02:53:02Z
https://github.com/w0r1dtr33/cve/issues/2
2,666,849,791
2
6,429
CVE-2024-11964
2024-11-28T17:15:18.500
A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management system 1.0. This affects an unknown part of the file /user/index.php. The manipulation of the argument emailid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurora0x1/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://phpgurukul.com/" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Aurora0x1/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Aurora0x1", "CVE" ]
# Phpgurukul Complaint Management system V1.0 /user/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Complaint Management system ## Vendor Homepage - https://phpgurukul.com/complaint-management-sytem/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter - Aurora0x1 ## Vulnerable File - /use...
Phpgurukul Complaint Management system V1.0 /user/index.php SQL injection
https://api.github.com/repos/Aurora0x1/CVE/issues/1/comments
0
2024-11-26T12:04:42Z
2024-11-26T12:04:42Z
https://github.com/Aurora0x1/CVE/issues/1
2,694,436,002
1
6,430
CVE-2024-11965
2024-11-28T17:15:19.383
A vulnerability has been found in PHPGurukul Complaint Management system 1.0 and classified as critical. This vulnerability affects unknown code of the file /user/reset-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurora0x1/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://phpgurukul.com/" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Aurora0x1/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Aurora0x1", "CVE" ]
# Phpgurukul Complaint Management system V1.0 /user/reset-password.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Complaint Management system ## Vendor Homepage - https://phpgurukul.com/complaint-management-sytem/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter - Aurora0x1 ## Vulnerable File ...
Phpgurukul Complaint Management system V1.0 /user/reset-password.php SQL injection
https://api.github.com/repos/Aurora0x1/CVE/issues/2/comments
0
2024-11-26T12:12:34Z
2024-11-26T12:12:34Z
https://github.com/Aurora0x1/CVE/issues/2
2,694,458,823
2
6,431
CVE-2024-11966
2024-11-28T18:15:07.547
A vulnerability was found in PHPGurukul Complaint Management system 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the publi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurora0x1/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://phpgurukul.com/" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Aurora0x1/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Aurora0x1", "CVE" ]
# Phpgurukul Complaint Management system V1.0 /admin/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Complaint Management system ## Vendor Homepage - https://phpgurukul.com/complaint-management-sytem/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter - Aurora0x1 ## Vulnerable File - /ad...
Phpgurukul Complaint Management system V1.0 /admin/index.php SQL injection
https://api.github.com/repos/Aurora0x1/CVE/issues/3/comments
0
2024-11-26T12:17:07Z
2024-11-26T12:17:08Z
https://github.com/Aurora0x1/CVE/issues/3
2,694,472,180
3
6,432
CVE-2024-11967
2024-11-28T18:15:07.780
A vulnerability was found in PHPGurukul Complaint Management system 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/reset-password.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurora0x1/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://phpgurukul.com/" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Aurora0x1/CVE/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Aurora0x1", "CVE" ]
# Phpgurukul Complaint Management system V1.0 /admin/reset-password.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Complaint Management system ## Vendor Homepage - https://phpgurukul.com/complaint-management-sytem/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter - Aurora0x1 ## Vulnerable File...
Phpgurukul Complaint Management system V1.0 /admin/reset-password.php SQL injection
https://api.github.com/repos/Aurora0x1/CVE/issues/4/comments
0
2024-11-26T12:22:58Z
2024-11-26T12:22:58Z
https://github.com/Aurora0x1/CVE/issues/4
2,694,487,435
4
6,433
CVE-2024-11970
2024-11-28T22:15:14.277
A vulnerability classified as critical has been found in code-projects Concert Ticket Ordering System 1.0. Affected is an unknown function of the file /tour(cor).php. The manipulation of the argument mai leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halhalz/1/issues/1" }, { "source": "cna@vuldb.com", "tag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anisha:concert_ticket_ordering_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4ED485D9-FEA3-4405-B971-6C7A4B2DCFFA", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/halhalz/1/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halhalz", "1" ]
# code-projects.org"Concert Ticket Ordering System" in PHP 1.0 "tour(cor).php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Concert Ticket Ordering System IN PHP, CSS, JavaScript, AND MYSQL | FREE DOWNLOAD ## Vendor Homepage + https://code-projects.org/concert-ticket-ordering-system-in-php-css-javascript-a...
code-projects.org"Concert Ticket Ordering System" in PHP 1.0 "tour(cor).php" SQL injection
https://api.github.com/repos/halhalz/1/issues/1/comments
0
2024-11-28T03:15:56Z
2024-11-28T03:15:56Z
https://github.com/halhalz/1/issues/1
2,700,612,926
1
6,434
CVE-2024-12180
2024-12-04T22:15:22.140
A vulnerability classified as problematic has been found in DedeCMS 5.7.116. Affected is an unknown function of the file /member/article_add.php. The manipulation of the argument body leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be use...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/76" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.286902" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8", "versionEndExcluding": "5.7.116", "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/76
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A stored Cross-Site Scripting (XSS) vulnerability has been identified in the DedeCMS V5.7.116 content management system. The vulnerability exists due to insufficient filtering of the `body` parameter in the `/member/article_add.php` script. This issue allows an attacker to inject malicious scripts into artic...
DedeCMS V5.7.116 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/76/comments
1
2024-11-27T07:03:17Z
2024-12-06T02:28:49Z
https://github.com/Hebing123/cve/issues/76
2,697,386,582
76
6,435
CVE-2024-12181
2024-12-04T22:15:22.360
A vulnerability classified as problematic was found in DedeCMS 5.7.116. Affected by this vulnerability is an unknown functionality of the file /member/uploads_add.php of the component SWF File Handler. The manipulation of the argument mediatype leads to cross site scripting. The attack can be launched remotely. The exp...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/77" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.286903" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8", "versionEndExcluding": "5.7.116", "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/77
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary DedeCMS V5.7.116 is affected by a stored cross-site scripting vulnerability that can be exploited by an attacker to upload a malicious SWF file, which can lead to XSS attacks. This vulnerability exists due to insufficient input validation and sanitization of user-supplied data. # Details Log in and go to...
DedeCMS V5.7.116 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/77/comments
1
2024-11-27T08:15:37Z
2024-12-06T02:29:05Z
https://github.com/Hebing123/cve/issues/77
2,697,588,984
77
6,436
CVE-2024-12182
2024-12-04T23:15:04.703
A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7.116. Affected by this issue is some unknown functionality of the file /member/soft_add.php. The manipulation of the argument body leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/78" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.286904" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8", "versionEndExcluding": "5.7.116", "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/78
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A stored Cross-Site Scripting (XSS) vulnerability has been identified in the DedeCMS V5.7.116 content management system. The vulnerability exists due to insufficient filtering of the `body` parameter in the `/member/soft_add.php` script. This issue allows an attacker to inject malicious scripts into softwa...
DedeCMS V5.7.116 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/78/comments
1
2024-11-27T09:33:27Z
2024-12-06T02:29:22Z
https://github.com/Hebing123/cve/issues/78
2,697,823,090
78
6,437
CVE-2024-12183
2024-12-04T23:15:05.760
A vulnerability, which was classified as problematic, was found in DedeCMS 5.7.116. This affects the function RemoveXSS of the file /plus/carbuyaction.php of the component HTTP POST Request Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/79" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.286905" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8", "versionEndExcluding": "5.7.116", "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/79
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary A stored XSS vulnerability has been identified in DedeCMS V5.7.116. Attackers can exploit this vulnerability by maliciously inserting an XSS payload in the comment section during the purchase of goods. # Details The vulnerability is located in the file `plus/carbuyaction.php`. Our analysis indicates that ...
DedeCMS V5.7.116 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/79/comments
1
2024-11-28T03:04:01Z
2024-12-06T02:29:41Z
https://github.com/Hebing123/cve/issues/79
2,700,547,563
79
6,438
CVE-2024-12187
2024-12-05T01:15:04.740
A vulnerability was found in 1000 Projects Library Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /showbook.php. The manipulation of the argument q leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PunyHunter/CVE/issues/1" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7B5BC36-12E9-4DE1-B238-C53C11EEAFB7", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/PunyHunter/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "PunyHunter", "CVE" ]
# 1000projects Library Management System BCA 4th Semester Minor Project using SQL and PHP V1.0 /showbook.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Library Management System BCA 4th Semester Minor Project using SQL and PHP ## Vendor Homepage - [homepage](https://1000projects.org/library-management-sy...
1000projects Library Management System BCA 4th Semester Minor Project using SQL and PHP V1.0 /showbook.php SQL injection
https://api.github.com/repos/PunyHunter/CVE/issues/1/comments
0
2024-12-02T08:57:35Z
2024-12-02T08:57:35Z
https://github.com/PunyHunter/CVE/issues/1
2,711,114,017
1
6,439
CVE-2024-12188
2024-12-05T01:15:04.943
A vulnerability was found in 1000 Projects Library Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /brains/stu.php. The manipulation of the argument useri leads to sql injection. The attack can be launched remotely. The exploit has been dis...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SkGoing/CVE-repo_00/issues/4" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7B5BC36-12E9-4DE1-B238-C53C11EEAFB7", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/SkGoing/CVE-repo_00/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "SkGoing", "CVE-repo_00" ]
# 1000projects Library Management System BCA 4th Semester Minor Project using SQL and PHP V1.0 /brains/stu.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Library Management System BCA 4th Semester Minor Project using SQL and PHP ## Vendor Homepage - [homepage](https://1000projects.org/library-management-...
1000projects Library Management System BCA 4th Semester Minor Project using SQL and PHP V1.0 /brains/stu.php SQL injection
https://api.github.com/repos/SkGoing/CVE-repo_00/issues/4/comments
0
2024-12-02T09:10:17Z
2024-12-02T09:10:18Z
https://github.com/SkGoing/CVE-repo_00/issues/4
2,711,146,439
4
6,440
CVE-2024-12228
2024-12-05T14:15:20.123
A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. Affected is an unknown function of the file /admin/user-search.php. The manipulation of the argument search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the pub...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PunyHunter/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://phpgurukul.com/" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/PunyHunter/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "PunyHunter", "CVE" ]
# Phpgurukul Complaint Management system V1.0 /admin/user-search.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Complaint Management system ## Vendor Homepage - https://phpgurukul.com/complaint-management-sytem/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter - punnyhunter ## Vulnerable File ...
Phpgurukul Complaint Management system V1.0 /admin/user-search.php SQL injection
https://api.github.com/repos/PunyHunter/CVE/issues/2/comments
0
2024-12-02T09:00:54Z
2024-12-02T09:00:54Z
https://github.com/PunyHunter/CVE/issues/2
2,711,122,865
2
6,441
CVE-2024-12229
2024-12-05T15:15:09.050
A vulnerability classified as critical was found in PHPGurukul Complaint Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/complaint-search.php. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been di...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/qiyes233/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://phpgurukul.com/" }, { "source": "cna@vuldb.com", "tag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/qiyes233/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "qiyes233", "CVE" ]
# Phpgurukul Complaint Management system V1.0 /admin/complaint-search.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Complaint Management system ## Vendor Homepage - https://phpgurukul.com/complaint-management-sytem/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter - qiye ## Vulnerable File ...
Phpgurukul Complaint Management system V1.0 /admin/complaint-search.php SQL injection
https://api.github.com/repos/qiyes233/CVE/issues/1/comments
0
2024-12-02T09:20:57Z
2024-12-02T09:20:57Z
https://github.com/qiyes233/CVE/issues/1
2,711,169,928
1
6,442
CVE-2024-12231
2024-12-05T16:15:24.933
A vulnerability, which was classified as critical, was found in CodeZips Project Management System 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SkGoing/CVE-repo_00/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.286977" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:project_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF56923B-4DFB-477A-8839-5AA94FD11344", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/SkGoing/CVE-repo_00/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "SkGoing", "CVE-repo_00" ]
# CodeZips Project Management System In PHP And MYSQL With Source Code V1.0 /index.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Project Management System In PHP And MYSQL With Source Code ## Vendor Homepage - [homepage](https://codezips.com/php/project-management-system-in-php-and-mysql-with-source-cod...
CodeZips Project Management System In PHP And MYSQL With Source Code V1.0 /index.php SQL injection
https://api.github.com/repos/SkGoing/CVE-repo_00/issues/3/comments
0
2024-12-02T09:08:51Z
2024-12-02T09:08:51Z
https://github.com/SkGoing/CVE-repo_00/issues/3
2,711,143,358
3
6,443
CVE-2024-12234
2024-12-05T17:15:11.213
A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-customer-detailed.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hacker0xone/CVE/issues/17" }, { "source": "cna@vuldb.com", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/Hacker0xone/CVE/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hacker0xone", "CVE" ]
# 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-customer-detailed.php SQL injection ## NAME OF AFFECTED PRODUCT(S) + Beauty Parlour Management System PHP SQLite Project ## Vendor Homepage + https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html ## AFFEC...
1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-customer-detailed.php SQL injection
https://api.github.com/repos/Hacker0xOne/CVE/issues/17/comments
0
2024-12-04T09:23:20Z
2024-12-04T09:23:20Z
https://github.com/Hacker0xOne/CVE/issues/17
2,717,081,474
17
6,444
CVE-2024-30961
2024-12-05T23:15:05.030
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the error-thrown mechanism in nav2_bt_navigator.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-planning/navigation2/issues/4175" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "94" ]
94
https://github.com/ros-planning/navigation2/issues/4175
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-planning", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
the mechanism defect of `bt_action_server ->on_cleanup()` may lead to UAF
https://api.github.com/repos/ros-navigation/navigation2/issues/4175/comments
8
2024-03-11T15:25:02Z
2024-03-14T17:05:16Z
https://github.com/ros-navigation/navigation2/issues/4175
2,179,426,419
4,175
6,445
CVE-2024-30962
2024-12-05T23:15:05.147
Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the nav2_amcl process
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-planning/navigation2/issues/4177" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "120" ]
120
https://github.com/ros-planning/navigation2/issues/4177
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-planning", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repositor...
Validate messages in subscription callbacks for critical error in population
https://api.github.com/repos/ros-navigation/navigation2/issues/4177/comments
6
2024-03-12T16:04:46Z
2024-05-02T14:30:43Z
https://github.com/ros-navigation/navigation2/issues/4177
2,182,048,705
4,177
6,446
CVE-2024-38921
2024-12-06T22:15:19.600
Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter`/amcl z_rand ` .
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4379" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "416" ]
416
https://github.com/ros-navigation/navigation2/issues/4379
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repositor...
18 bugs (UAF) in `nav2_amcl` by setting dynamic parameters
https://api.github.com/repos/ros-navigation/navigation2/issues/4379/comments
6
2024-05-30T14:43:04Z
2024-06-05T16:47:20Z
https://github.com/ros-navigation/navigation2/issues/4379
2,325,854,595
4,379
6,447
CVE-2024-38922
2024-12-06T22:15:19.720
Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a heap overflow in the nav2_amcl process. This vulnerability is triggered via sending a crafted message to the component /initialpose.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/open-navigation/navigation2/issues/4307" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/open-navigation/navigation2/issues/4307
[ "Exploit", "Issue Tracking" ]
github.com
[ "open-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
some special msg onto `/initialpose` could lead to heap-buffer-overflow bug
https://api.github.com/repos/ros-navigation/navigation2/issues/4307/comments
10
2024-05-07T10:32:09Z
2024-06-11T15:39:28Z
https://github.com/ros-navigation/navigation2/issues/4307
2,282,891,923
4,307
6,448
CVE-2024-38922
2024-12-06T22:15:19.720
Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a heap overflow in the nav2_amcl process. This vulnerability is triggered via sending a crafted message to the component /initialpose.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/open-navigation/navigation2/issues/4307" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/ros-navigation/navigation2/issues/4294
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
validate msg onto `/initialpose` would result in a stack-buffer-overflow bug in `nav2_amcl`
https://api.github.com/repos/ros-navigation/navigation2/issues/4294/comments
1
2024-05-03T12:07:57Z
2024-05-09T05:44:07Z
https://github.com/ros-navigation/navigation2/issues/4294
2,277,546,456
4,294
6,449
CVE-2024-41644
2024-12-06T22:15:20.450
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via the dyn_param_handler_ component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4496" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4496
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
Completely shutdown dynamic_param callback threads instead of only `dyn_param_handler_.reset()`
https://api.github.com/repos/ros-navigation/navigation2/issues/4496/comments
5
2024-06-26T07:35:14Z
2024-08-30T06:45:24Z
https://github.com/ros-navigation/navigation2/issues/4496
2,374,591,094
4,496
6,450
CVE-2024-41645
2024-12-06T22:15:20.563
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2__amcl.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4497" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4497
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
## Bug report **Required Info:** - Operating System: - <!-- OS and version (e.g. Windows 10, Ubuntu 16.04...) --> ubuntu 22.04 - ROS2 Version: - <!-- ROS2 distribution and install method (e.g. Foxy binaries, Dashing source...) --> humble - Version or commit hash: - <!-- from source: output of `git -C ...
[nav2_costmap] UAF bug caused by incomplete closed `dynamicParametersCallback` thread in `Inflation_layer_`
https://api.github.com/repos/ros-navigation/navigation2/issues/4497/comments
1
2024-06-26T07:51:11Z
2024-06-27T15:20:35Z
https://github.com/ros-navigation/navigation2/issues/4497
2,374,628,765
4,497
6,451
CVE-2024-41646
2024-12-06T22:15:20.683
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_dwb_controller.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4437" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4437
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right reposit...
NullPtr bug during the `getRobotPose()` calculation of `costmap_ros_` in `nav2_controller`
https://api.github.com/repos/ros-navigation/navigation2/issues/4437/comments
4
2024-06-14T20:22:16Z
2024-06-24T17:40:52Z
https://github.com/ros-navigation/navigation2/issues/4437
2,354,037,707
4,437
6,452
CVE-2024-41647
2024-12-06T22:15:20.807
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_mppi_controller.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4436" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "732" ]
732
https://github.com/ros-navigation/navigation2/issues/4436
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
NullPtr bug during the `computeVelocityCommands()` during shutdown
https://api.github.com/repos/ros-navigation/navigation2/issues/4436/comments
5
2024-06-14T18:04:35Z
2024-06-24T17:40:36Z
https://github.com/ros-navigation/navigation2/issues/4436
2,353,847,380
4,436
6,453
CVE-2024-41648
2024-12-06T22:15:20.920
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_regulated_pure_pursuit_controller.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4438" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4438
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repositor...
NullPtr bug during the `computeVelocityCommands()` calculation of `nav2_regulated_pure_pursuit_controller`
https://api.github.com/repos/ros-navigation/navigation2/issues/4438/comments
1
2024-06-14T21:09:26Z
2024-06-18T08:54:37Z
https://github.com/ros-navigation/navigation2/issues/4438
2,354,120,170
4,438
6,454
CVE-2024-41649
2024-12-06T22:15:21.037
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the executor_thread_.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/open-navigation/navigation2/issues/4323" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/open-navigation/navigation2/issues/4323
[ "Exploit", "Issue Tracking" ]
github.com
[ "open-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
NullPtr bug occurs during costmap-calculation of `controller_server`
https://api.github.com/repos/ros-navigation/navigation2/issues/4323/comments
5
2024-05-10T07:18:36Z
2024-05-31T15:41:25Z
https://github.com/ros-navigation/navigation2/issues/4323
2,289,118,828
4,323
6,455
CVE-2024-41650
2024-12-06T22:15:21.163
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_costmap_2d.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4489" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "281" ]
281
https://github.com/ros-navigation/navigation2/issues/4489
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
## Bug report **Required Info:** - Operating System: - <!-- OS and version (e.g. Windows 10, Ubuntu 16.04...) --> ubuntu 22.04 - ROS2 Version: - <!-- ROS2 distribution and install method (e.g. Foxy binaries, Dashing source...) --> humble - Version or commit hash: - <!-- from source: output of `git -C ...
[nav2_costmap] UAF bug caused by the exit mechanism flaw in class `ClearCostmapService`
https://api.github.com/repos/ros-navigation/navigation2/issues/4489/comments
1
2024-06-25T10:24:22Z
2024-06-26T16:32:10Z
https://github.com/ros-navigation/navigation2/issues/4489
2,372,307,138
4,489
6,456
CVE-2024-44852
2024-12-06T22:15:21.277
Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a segmentation violation via the component theta_star::ThetaStar::isUnsafeToPlan().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/open-navigation/navigation2/issues/4464" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "763" ]
763
https://github.com/open-navigation/navigation2/issues/4464
[ "Exploit", "Issue Tracking" ]
github.com
[ "open-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
Invalidate Pointer Accessed during `isUnsafeToPlan()` calculation of `nav2_theta_planner`
https://api.github.com/repos/ros-navigation/navigation2/issues/4464/comments
1
2024-06-24T12:40:53Z
2024-06-24T12:43:37Z
https://github.com/ros-navigation/navigation2/issues/4464
2,370,151,679
4,464
6,457
CVE-2024-44853
2024-12-06T22:15:21.390
Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component computeControl().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4547" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/ros-navigation/navigation2/issues/4547
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right reposit...
[nav2_controller] nullPtr bug during `comupteControl()`
https://api.github.com/repos/ros-navigation/navigation2/issues/4547/comments
0
2024-07-21T06:48:05Z
2024-07-22T17:05:48Z
https://github.com/ros-navigation/navigation2/issues/4547
2,421,255,890
4,547
6,458
CVE-2024-44854
2024-12-06T22:15:21.500
Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component smoothPlan().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4538" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/ros-navigation/navigation2/issues/4538
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repository?...
[nav2_smoother] nullptr bug during `smooth_plan()`
https://api.github.com/repos/ros-navigation/navigation2/issues/4538/comments
3
2024-07-16T20:02:08Z
2024-07-19T16:44:40Z
https://github.com/ros-navigation/navigation2/issues/4538
2,411,949,445
4,538
6,459
CVE-2024-44855
2024-12-06T22:15:21.630
Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component nav2_navfn_planner().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/open-navigation/navigation2/issues/4466" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/open-navigation/navigation2/issues/4466
[ "Exploit", "Issue Tracking" ]
github.com
[ "open-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right repositor...
NullPointer Accessed during `makePlan` calculation of nav2_navfn_planner
https://api.github.com/repos/ros-navigation/navigation2/issues/4466/comments
1
2024-06-24T12:54:09Z
2024-06-24T12:55:32Z
https://github.com/ros-navigation/navigation2/issues/4466
2,370,183,275
4,466
6,460
CVE-2024-44856
2024-12-06T22:15:21.753
Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component nav2_smac_planner().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GoesM/ROS-CVE-CNVDs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ros-navigation/navigation2/issues/4468" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*", "matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "476" ]
476
https://github.com/ros-navigation/navigation2/issues/4468
[ "Exploit", "Issue Tracking" ]
github.com
[ "ros-navigation", "navigation2" ]
<!-- For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`. For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros Not sure if this is the right reposit...
NullPointer Accessed during `findCircumscribedCost` calculation of nav2_smac_planner
https://api.github.com/repos/ros-navigation/navigation2/issues/4468/comments
1
2024-06-24T13:09:15Z
2024-06-24T13:09:36Z
https://github.com/ros-navigation/navigation2/issues/4468
2,370,218,387
4,468
6,461
CVE-2024-12353
2024-12-09T02:15:18.920
A vulnerability, which was classified as problematic, has been found in SourceCodester Phone Contact Manager System 1.0. This issue affects the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation of the argument name leads to improper input validation. Attacking locally is a requiremen...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 1.7, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jasontimwong/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.287273" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "20" ]
20
https://github.com/jasontimwong/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jasontimwong", "CVE" ]
# SourceCodester Phone Contact Manager System in C++ with Source Code Buffer Pollution Leading to Data Integrity Corruption and Potential Security Risks ## Vulnerability Information ### Affected Components - **System/Software Name**: Phone Contact Manager System - **Version**: Current Implementation ### Pr...
SourceCodester Phone Contact Manager System in C++ with Source Code Buffer Pollution Leading to Data Integrity Corruption and Potential Security Risks
https://api.github.com/repos/jasontimwong/CVE/issues/1/comments
0
2024-12-05T16:31:14Z
2024-12-05T16:35:36Z
https://github.com/jasontimwong/CVE/issues/1
2,720,880,661
1
6,462
CVE-2024-12354
2024-12-09T02:15:19.120
A vulnerability, which was classified as critical, was found in SourceCodester Phone Contact Manager System 1.0. Affected is the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation leads to buffer overflow. It is possible to launch the attack on the local host. The exploit has been dis...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jasontimwong/CVE/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.287274" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/jasontimwong/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jasontimwong", "CVE" ]
# SourceCodester Phone Contact Manager System in C++ with Source Code Improper Input Verification Can Lead to Abnormal Circuit Logic and Resource Consumption Risks ## Vulnerability Information ### Affected Components - **System/Software Name**: Phone Contact Manager System - **Version**: Current Implementatio...
SourceCodester Phone Contact Manager System in C++ with Source Code Improper Input Verification Can Lead to Abnormal Circuit Logic and Resource Consumption Risks
https://api.github.com/repos/jasontimwong/CVE/issues/2/comments
0
2024-12-05T17:53:03Z
2024-12-05T23:05:37Z
https://github.com/jasontimwong/CVE/issues/2
2,721,057,081
2
6,463
CVE-2024-12497
2024-12-12T02:15:22.367
A vulnerability classified as critical has been found in 1000 Projects Attendance Tracking Management System 1.0. Affected is an unknown function of the file /admin/check_admin_login.php. The manipulation of the argument admin_user_name leads to sql injection. It is possible to launch the attack remotely. The exploit h...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Ta0k1a/CVE/issues/1" }, { "source": "cna@vuldb.com", "tag...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4", "versionEndExcluding": null, "versionEndIncluding": null...
[ "89" ]
89
https://github.com/Ta0k1a/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Ta0k1a", "CVE" ]
# 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/check_admin_login.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Attendance Tracking Management System PHP & MySQL Project ## Vendor Homepage - [homepage](https://1000projects.org/attendance-tracking-management-system-ph...
1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/check_admin_login.php SQL injection
https://api.github.com/repos/Ta0k1a/CVE/issues/1/comments
0
2024-12-09T12:51:14Z
2024-12-09T12:51:14Z
https://github.com/Ta0k1a/CVE/issues/1
2,726,967,119
1
6,464
CVE-2024-12841
2024-12-20T19:15:06.097
A vulnerability was found in Emlog Pro up to 2.4.1. It has been classified as problematic. This affects an unknown part of the file /admin/tag.php. The manipulation of the argument keyword leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/emlog/emlog/issues/305" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.289077" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28", "versionEndExcluding": null, "versionEndIncluding": "2.4.1", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/305
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "emlog", "emlog" ]
# Summary emlog pro 2.4.1 is affected by multiple reflected Cross-Site Scripting (XSS) vulnerabilities. These vulnerabilities occur due to insufficient input validation and sanitation, allowing attackers to inject malicious scripts into web pages that are then executed in the browsers of other users. # Details This...
Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in emlog pro 2.4.1
https://api.github.com/repos/emlog/emlog/issues/305/comments
2
2024-12-13T02:55:33Z
2025-03-28T04:43:36Z
https://github.com/emlog/emlog/issues/305
2,737,265,718
305
6,465
CVE-2024-12845
2024-12-20T22:15:24.727
A vulnerability classified as problematic was found in Emlog Pro up to 2.4.1. Affected by this vulnerability is an unknown functionality in the library /include/lib/common.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/emlog/emlog/issues/306" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.289081" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28", "versionEndExcluding": null, "versionEndIncluding": "2.4.1", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/306
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "emlog", "emlog" ]
# Summary A reflected Cross Site Scripting (XSS) vulnerability exists in emlog pro 2.4.1 due to improper sanitization of the $msg parameter in /include/lib/common.php. # Details This vulnerability can be exploited by an attacker to inject malicious scripts into the web application, which can then be executed in the ...
emlog pro 2.4.1 has a reflected XSS vulnerability
https://api.github.com/repos/emlog/emlog/issues/306/comments
2
2024-12-13T04:00:15Z
2025-03-28T04:43:53Z
https://github.com/emlog/emlog/issues/306
2,737,341,754
306
6,466
CVE-2024-12846
2024-12-21T05:15:07.373
A vulnerability, which was classified as problematic, has been found in Emlog Pro up to 2.4.1. Affected by this issue is some unknown functionality of the file /admin/link.php. The manipulation of the argument siteurl/icon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/307" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.289082" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "B449A14E-7C7E-4541-95AB-C2E55846E4D3", "versionEndExcluding": "2.4.1", "versionEndIncluding": null, "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/307
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Summary A stored XSS vulnerability exists in emlog pro 2.4.1 which allows attackers to execute arbitrary HTML code. # Details Because `/admin/link.php` has CSRF problems, attackers can use XSS to cooperate with CSRF to attack. The `siteurl` and `icon` parameters have XSS vulnerabilities. ![image](https://githu...
emlog pro 2.4.1 Stored XSS Vulnerability
https://api.github.com/repos/emlog/emlog/issues/307/comments
3
2024-12-13T06:53:57Z
2025-03-28T04:44:01Z
https://github.com/emlog/emlog/issues/307
2,737,587,217
307
6,467
CVE-2024-12898
2024-12-23T01:15:06.840
A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/faculty_action.php. The manipulation of the argument faculty_course_id leads to sql injection. The attack can be initiated remotely. The expl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/onupset/CVE/issues/1" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4", "versionEndExcluding": null, "versionEndIncluding": null...
[ "89" ]
89
https://github.com/onupset/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "onupset", "CVE" ]
# 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/faculty_action.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Attendance Tracking Management System PHP & MySQL Project ## Vendor Homepage + [homepage](https://1000projects.org/attendance-tracking-management-system-php-mysql-pr...
1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/faculty_action.php SQL injection
https://api.github.com/repos/onupset/CVE/issues/1/comments
0
2024-12-21T09:31:47Z
2024-12-21T09:31:47Z
https://github.com/onupset/CVE/issues/1
2,753,862,860
1
6,468
CVE-2024-12899
2024-12-23T01:15:07.020
A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/course_action.php. The manipulation of the argument course_code leads to sql injection. The attack may be initiated remotely. The exploit has...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Murrayzed/CVE/issues/1" }, { "source": "cna@vuldb.com", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4", "versionEndExcluding": null, "versionEndIncluding": null...
[ "89" ]
89
https://github.com/Murrayzed/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Murrayzed", "CVE" ]
# 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/course_action.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Attendance Tracking Management System PHP & MySQL Project ## Vendor Homepage + [homepage](https://1000projects.org/attendance-tracking-management-system-php-mysql-pro...
1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/course_action.php SQL injection
https://api.github.com/repos/Murrayzed/CVE/issues/1/comments
0
2024-12-22T08:36:57Z
2024-12-22T08:36:57Z
https://github.com/Murrayzed/CVE/issues/1
2,754,552,122
1
6,469
CVE-2024-12940
2024-12-26T07:15:11.637
A vulnerability has been found in 1000 Projects Attendance Tracking Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/student_action.php. The manipulation of the argument student_id leads to sql injection. The attack can be initiated remotely. The exploit has b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bug3536/CVE/issues/1" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4", "versionEndExcluding": null, "versionEndIncluding": null...
[ "89" ]
89
https://github.com/bug3536/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bug3536", "CVE" ]
# 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/student_action.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Attendance Tracking Management System PHP & MySQL Project ## Vendor Homepage + [homepage](https://1000projects.org/attendance-tracking-management-system-php-mysql-pr...
1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/student_action.php SQL injection
https://api.github.com/repos/bug3536/CVE/issues/1/comments
0
2024-12-24T06:43:51Z
2024-12-24T06:43:51Z
https://github.com/bug3536/CVE/issues/1
2,757,281,911
1
6,470
CVE-2024-13004
2024-12-29T07:15:05.643
A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. This affects an unknown part of the file /admin/category.php. The manipulation of the argument state leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alc9700jmo/CVE/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://phpgurukul.com/" }, { "source": "cna@vuldb.com", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/alc9700jmo/CVE/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alc9700jmo", "CVE" ]
# Phpgurukul Complaint Management system V1.0 /admin/category.php SQL injection # NAME OF AFFECTED PRODUCT(S) - Complaint Management system ## Vendor Homepage - https://phpgurukul.com/complaint-management-sytem/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter - alc9700 ## Vulnerable File - /a...
Phpgurukul Complaint Management system V1.0 /admin/category.php SQL injection
https://api.github.com/repos/alc9700jmo/CVE/issues/6/comments
0
2024-12-27T13:58:14Z
2024-12-27T13:58:15Z
https://github.com/alc9700jmo/CVE/issues/6
2,760,919,377
6
6,471
CVE-2024-13008
2024-12-29T10:15:05.853
A vulnerability has been found in code-projects Responsive Hotel Site 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/newsletter.php. The manipulation of the argument eid leads to sql injection. The attack can be launched remotely. The exploit has been discl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Err-4O4/cve/issues/1" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/Err-4O4/cve/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Err-4O4", "cve" ]
# code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection # eidOF AFFECTED PRODUCT(S) - Responsive Hotel Site Using PHP With Source Code ## Vendor Homepage - https://code-projects.org/responsive-hotel-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ...
code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection
https://api.github.com/repos/Err-4O4/cve/issues/1/comments
0
2024-12-29T07:24:18Z
2024-12-29T07:24:18Z
https://github.com/Err-4O4/cve/issues/1
2,762,139,940
1
6,472
CVE-2024-13008
2024-12-29T10:15:05.853
A vulnerability has been found in code-projects Responsive Hotel Site 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/newsletter.php. The manipulation of the argument eid leads to sql injection. The attack can be launched remotely. The exploit has been discl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Err-4O4/cve/issues/1" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "89" ]
89
https://github.com/Lanxiy7th/lx_CVE_report-/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Lanxiy7th", "lx_CVE_report-" ]
# code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection # eidOF AFFECTED PRODUCT(S) + Responsive Hotel Site Using PHP With Source Code ## Vendor Homepage + https://code-projects.org/responsive-hotel-site-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submit...
code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection
https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/18/comments
0
2024-12-28T03:56:11Z
2024-12-28T03:56:12Z
https://github.com/Lanxiy7th/lx_CVE_report-/issues/18
2,761,422,178
18
6,473
CVE-2024-13037
2024-12-30T04:15:05.200
A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been classified as critical. Affected is the function attendance_report of the file /admin/report.php. The manipulation of the argument course_id leads to sql injection. It is possible to launch the attack remotely. The exploit...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matias-a11y/cve/issues/2" }, { "sourc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4", "versionEndExcluding": null, "versionEndIncluding": null...
[ "89" ]
89
https://github.com/matias-a11y/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matias-a11y", "cve" ]
# **Step-by-Step Vulnerability Report** ## **Step 1: Context and System Overview** - **Application Name**: Attendance Tracking Management System (PHP & MySQL) - **Version**: 1.0 - **Vulnerable Endpoint**: `/admin/report.php` - **Discovered By**: mxh9934 - **Vendor Homepage**: [Attendance Tracking Mana...
Attendance Tracking Management System SQL
https://api.github.com/repos/matias-a11y/cve/issues/2/comments
0
2024-12-29T14:24:23Z
2024-12-29T14:24:23Z
https://github.com/matias-a11y/cve/issues/2
2,762,272,987
2
6,474
CVE-2024-13132
2025-01-05T05:15:06.400
A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and ma...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/309" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/309#issue-275531...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/309
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Description Emlog pro 2.4.3 is vulnerable to XSS in admin/article.php # Root Cause The server retrieves the parameters passed by the browser, concatenates them to form a URL address, and then returns it to the browser ![image](https://github.com/user-attachments/assets/329541e0-1639-4e36-ba4d-95f1b004d441) #...
emlog pro 2.4.3 has a reflected XSS vulnerability in article.php
https://api.github.com/repos/emlog/emlog/issues/309/comments
2
2024-12-23T06:21:09Z
2025-03-28T04:44:14Z
https://github.com/emlog/emlog/issues/309
2,755,317,359
309
6,475
CVE-2024-13132
2025-01-05T05:15:06.400
A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and ma...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/309" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/309#issue-275531...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/309#issue-2755317359
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Description Emlog pro 2.4.3 is vulnerable to XSS in admin/article.php # Root Cause The server retrieves the parameters passed by the browser, concatenates them to form a URL address, and then returns it to the browser ![image](https://github.com/user-attachments/assets/329541e0-1639-4e36-ba4d-95f1b004d441) #...
emlog pro 2.4.3 has a reflected XSS vulnerability in article.php
https://api.github.com/repos/emlog/emlog/issues/309/comments
2
2024-12-23T06:21:09Z
2025-03-28T04:44:14Z
https://github.com/emlog/emlog/issues/309
2,755,317,359
309
6,476
CVE-2024-13135
2025-01-05T09:15:05.240
A vulnerability has been found in Emlog Pro 2.4.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/twitter.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/311" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/311#issue-275540...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:2.4.3:*:*:*:pro:*:*:*", "matchCriteriaId": "790999A9-DC94-42E9-B5B3-CA10F4BF0E0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/emlog/emlog/issues/311
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Description Emlog pro 2.4.3 is vulnerable to XSS in admin/twitter.php.Attackers can add malicious JavaScript scripts to the URL, and the server will concatenate the malicious scripts into the URL and return them to the browser, ultimately causing XSS vulnerabilities # Root Case The server retrieves the parameter...
emlog pro 2.4.3 has a reflected XSS vulnerability in twitter.php
https://api.github.com/repos/emlog/emlog/issues/311/comments
2
2024-12-23T07:24:38Z
2025-03-28T04:44:33Z
https://github.com/emlog/emlog/issues/311
2,755,404,584
311
6,477
CVE-2024-13135
2025-01-05T09:15:05.240
A vulnerability has been found in Emlog Pro 2.4.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/twitter.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/311" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/311#issue-275540...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:2.4.3:*:*:*:pro:*:*:*", "matchCriteriaId": "790999A9-DC94-42E9-B5B3-CA10F4BF0E0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/emlog/emlog/issues/311#issue-2755404584
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Description Emlog pro 2.4.3 is vulnerable to XSS in admin/twitter.php.Attackers can add malicious JavaScript scripts to the URL, and the server will concatenate the malicious scripts into the URL and return them to the browser, ultimately causing XSS vulnerabilities # Root Case The server retrieves the parameter...
emlog pro 2.4.3 has a reflected XSS vulnerability in twitter.php
https://api.github.com/repos/emlog/emlog/issues/311/comments
2
2024-12-23T07:24:38Z
2025-03-28T04:44:33Z
https://github.com/emlog/emlog/issues/311
2,755,404,584
311
6,478
CVE-2024-13136
2025-01-05T09:15:06.320
A vulnerability was found in wangl1989 mysiteforme 1.0 and classified as critical. Affected by this issue is the function rememberMeManager of the file src/main/java/com/mysiteforme/admin/config/ShiroConfig.java. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issues/52" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "502" ]
502
https://github.com/wangl1989/mysiteforme/issues/52
[ "Exploit", "Issue Tracking" ]
github.com
[ "wangl1989", "mysiteforme" ]
Code Audit: src/main/java/com/mysiteforme/admin/config/ShiroConfig.java The rememberMeManager method in leaks the key 2AvVhdsgUs0FSA3SDFAdeg==, which can directly cause remote command execution. ![image](https://github.com/user-attachments/assets/ed5fbd86-f56f-4c66-86ef-998d7ce76e37) Vulnerability exploitation: !...
Mysiteforme 1.0 has Remote Command Execution
https://api.github.com/repos/wangl1989/mysiteforme/issues/52/comments
0
2024-12-24T12:03:30Z
2025-01-12T12:01:59Z
https://github.com/wangl1989/mysiteforme/issues/52
2,757,682,365
52
6,479
CVE-2024-13136
2025-01-05T09:15:06.320
A vulnerability was found in wangl1989 mysiteforme 1.0 and classified as critical. Affected by this issue is the function rememberMeManager of the file src/main/java/com/mysiteforme/admin/config/ShiroConfig.java. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issues/52" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "502" ]
502
https://github.com/wangl1989/mysiteforme/issues/52#issue-2757682365
[ "Exploit", "Issue Tracking" ]
github.com
[ "wangl1989", "mysiteforme" ]
Code Audit: src/main/java/com/mysiteforme/admin/config/ShiroConfig.java The rememberMeManager method in leaks the key 2AvVhdsgUs0FSA3SDFAdeg==, which can directly cause remote command execution. ![image](https://github.com/user-attachments/assets/ed5fbd86-f56f-4c66-86ef-998d7ce76e37) Vulnerability exploitation: !...
Mysiteforme 1.0 has Remote Command Execution
https://api.github.com/repos/wangl1989/mysiteforme/issues/52/comments
0
2024-12-24T12:03:30Z
2025-01-12T12:01:59Z
https://github.com/wangl1989/mysiteforme/issues/52
2,757,682,365
52
6,480
CVE-2024-13137
2025-01-05T10:15:06.707
A vulnerability was found in wangl1989 mysiteforme 1.0. It has been classified as problematic. This affects the function RestResponse of the file src/main/java/com/mysiteforme/admin/controller/system/SiteController. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The expl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issues/54" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/wangl1989/mysiteforme/issues/54
[ "Exploit", "Issue Tracking" ]
github.com
[ "wangl1989", "mysiteforme" ]
Code Audit: In src/main/java/com/mysiteforme/admin/controller/system/SiteController. java, the edit method did not filter the incoming data, resulting in the storage of XSS ![image](https://github.com/user-attachments/assets/8804eab2-7978-4cb5-90a9-d85b58ed7ef8) ![image](https://github.com/user-attachments/assets/e1...
Mysiteforme 1.0 has storage XSS
https://api.github.com/repos/wangl1989/mysiteforme/issues/54/comments
1
2024-12-24T12:53:51Z
2025-02-11T19:44:02Z
https://github.com/wangl1989/mysiteforme/issues/54
2,757,765,372
54
6,481
CVE-2024-13137
2025-01-05T10:15:06.707
A vulnerability was found in wangl1989 mysiteforme 1.0. It has been classified as problematic. This affects the function RestResponse of the file src/main/java/com/mysiteforme/admin/controller/system/SiteController. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The expl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issues/54" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/wangl1989/mysiteforme/issues/54#issue-2757765372
[ "Exploit", "Issue Tracking" ]
github.com
[ "wangl1989", "mysiteforme" ]
Code Audit: In src/main/java/com/mysiteforme/admin/controller/system/SiteController. java, the edit method did not filter the incoming data, resulting in the storage of XSS ![image](https://github.com/user-attachments/assets/8804eab2-7978-4cb5-90a9-d85b58ed7ef8) ![image](https://github.com/user-attachments/assets/e1...
Mysiteforme 1.0 has storage XSS
https://api.github.com/repos/wangl1989/mysiteforme/issues/54/comments
1
2024-12-24T12:53:51Z
2025-02-11T19:44:02Z
https://github.com/wangl1989/mysiteforme/issues/54
2,757,765,372
54
6,482
CVE-2024-13138
2025-01-05T11:15:05.747
A vulnerability was found in wangl1989 mysiteforme 1.0. It has been declared as critical. This vulnerability affects the function upload of the file src/main/java/com/mysiteform/admin/service/ipl/LocalUploadServiceImpl. The manipulation of the argument test leads to unrestricted upload. The attack can be initiated remo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issues/55" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "434" ]
434
https://github.com/wangl1989/mysiteforme/issues/55
[ "Exploit", "Issue Tracking" ]
github.com
[ "wangl1989", "mysiteforme" ]
Code Audit: Src/main/java/com/mysiteform/admin/service/ipl/LocalUploadServiceImpl. The upload file in src/main/java is not protected, resulting in the ability to upload JSP Trojans and HTML files ![image](https://github.com/user-attachments/assets/f7191c10-bd09-4b46-b5d7-e234f0125332) ![image](https://github.com/use...
Mysiteforme 1.0 has arbitrary File Upload
https://api.github.com/repos/wangl1989/mysiteforme/issues/55/comments
1
2024-12-24T14:25:36Z
2025-02-11T16:17:38Z
https://github.com/wangl1989/mysiteforme/issues/55
2,757,868,654
55
6,483
CVE-2024-13138
2025-01-05T11:15:05.747
A vulnerability was found in wangl1989 mysiteforme 1.0. It has been declared as critical. This vulnerability affects the function upload of the file src/main/java/com/mysiteform/admin/service/ipl/LocalUploadServiceImpl. The manipulation of the argument test leads to unrestricted upload. The attack can be initiated remo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issues/55" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "434" ]
434
https://github.com/wangl1989/mysiteforme/issues/55#issue-2757868654
[ "Exploit", "Issue Tracking" ]
github.com
[ "wangl1989", "mysiteforme" ]
Code Audit: Src/main/java/com/mysiteform/admin/service/ipl/LocalUploadServiceImpl. The upload file in src/main/java is not protected, resulting in the ability to upload JSP Trojans and HTML files ![image](https://github.com/user-attachments/assets/f7191c10-bd09-4b46-b5d7-e234f0125332) ![image](https://github.com/use...
Mysiteforme 1.0 has arbitrary File Upload
https://api.github.com/repos/wangl1989/mysiteforme/issues/55/comments
1
2024-12-24T14:25:36Z
2025-02-11T16:17:38Z
https://github.com/wangl1989/mysiteforme/issues/55
2,757,868,654
55
6,484
CVE-2024-13139
2025-01-05T11:15:07.247
A vulnerability was found in wangl1989 mysiteforme 1.0. It has been rated as critical. This issue affects the function doContent of the file src/main/java/com/mysiteform/admin/controller/system/FileController. The manipulation of the argument content leads to server-side request forgery. The attack may be initiated rem...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issues/56" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "918" ]
918
https://github.com/wangl1989/mysiteforme/issues/56
[ "Exploit", "Issue Tracking" ]
github.com
[ "wangl1989", "mysiteforme" ]
Code Audit: The doContent method in src/main/java/com/mysiteform/admin/controller/system/FileController. java does not filter the incoming content ![image](https://github.com/user-attachments/assets/b132c49c-7fd4-4b3e-825d-cba9f522c9ff) Follow up with uploadLocalImg, the general process is to read the file based on ...
Mysiteforme 1.0 has SSRF
https://api.github.com/repos/wangl1989/mysiteforme/issues/56/comments
1
2024-12-24T14:32:54Z
2025-02-11T16:07:58Z
https://github.com/wangl1989/mysiteforme/issues/56
2,757,876,365
56
6,485
CVE-2024-13139
2025-01-05T11:15:07.247
A vulnerability was found in wangl1989 mysiteforme 1.0. It has been rated as critical. This issue affects the function doContent of the file src/main/java/com/mysiteform/admin/controller/system/FileController. The manipulation of the argument content leads to server-side request forgery. The attack may be initiated rem...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issues/56" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/wangl1989/mysiteforme/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "918" ]
918
https://github.com/wangl1989/mysiteforme/issues/56#issue-2757876365
[ "Exploit", "Issue Tracking" ]
github.com
[ "wangl1989", "mysiteforme" ]
Code Audit: The doContent method in src/main/java/com/mysiteform/admin/controller/system/FileController. java does not filter the incoming content ![image](https://github.com/user-attachments/assets/b132c49c-7fd4-4b3e-825d-cba9f522c9ff) Follow up with uploadLocalImg, the general process is to read the file based on ...
Mysiteforme 1.0 has SSRF
https://api.github.com/repos/wangl1989/mysiteforme/issues/56/comments
1
2024-12-24T14:32:54Z
2025-02-11T16:07:58Z
https://github.com/wangl1989/mysiteforme/issues/56
2,757,876,365
56
6,486
CVE-2024-13140
2025-01-05T12:15:05.473
A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/312" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/312#issue-275854...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/312
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Summary An XSS vulnerability has been discovered in emlog pro 2.4.3. The vulnerability stems from the fact that `/admin/article.php` does not filter malicious SVG files. This vulnerability allows an attacker with content editing permissions to exploit the system by uploading an SVG file containing malicious XML code...
emlog pro 2.4.3 Stored XSS Vulnerability in /admin/article.php
https://api.github.com/repos/emlog/emlog/issues/312/comments
2
2024-12-25T06:37:01Z
2025-03-28T04:43:16Z
https://github.com/emlog/emlog/issues/312
2,758,546,837
312
6,487
CVE-2024-13140
2025-01-05T12:15:05.473
A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely....
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/312" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emlog/emlog/issues/312#issue-275854...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*", "matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionStartExcluding...
[ "79" ]
79
https://github.com/emlog/emlog/issues/312#issue-2758546837
[ "Exploit", "Issue Tracking" ]
github.com
[ "emlog", "emlog" ]
# Summary An XSS vulnerability has been discovered in emlog pro 2.4.3. The vulnerability stems from the fact that `/admin/article.php` does not filter malicious SVG files. This vulnerability allows an attacker with content editing permissions to exploit the system by uploading an SVG file containing malicious XML code...
emlog pro 2.4.3 Stored XSS Vulnerability in /admin/article.php
https://api.github.com/repos/emlog/emlog/issues/312/comments
2
2024-12-25T06:37:01Z
2025-03-28T04:43:16Z
https://github.com/emlog/emlog/issues/312
2,758,546,837
312
6,488
CVE-2024-13141
2025-01-05T15:15:17.257
A vulnerability classified as problematic was found in osuuu LightPicture up to 1.2.2. This vulnerability affects unknown code of the file /api/upload of the component SVG File Upload Handler. The manipulation of the argument file leads to cross site scripting. The attack can be initiated remotely. The exploit has been...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/83" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.290224" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:osuuu:lightpicture:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD1EF5E0-DD84-4D9A-8408-482F1BFDB5BC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "79" ]
79
https://github.com/Hebing123/cve/issues/83
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
# Summary osuuu LightPicture 1.2.2 version is vulnerable to a stored Cross-Site Scripting (XSS) attack. The vulnerability exists in the system's settings where users with the ability to upload images are allowed to upload SVG files by default. # Details The vulnerability arises because the system does not sufficient...
osuuu LightPicture 1.2.2 Stored XSS Vulnerability
https://api.github.com/repos/Hebing123/cve/issues/83/comments
1
2024-12-25T03:18:08Z
2025-03-21T02:38:49Z
https://github.com/Hebing123/cve/issues/83
2,758,447,373
83
6,489
CVE-2025-0231
2025-01-05T22:15:05.540
A vulnerability has been found in Codezips Gym Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard/admin/submit_payments.php. The manipulation of the argument m_id leads to sql injection. The attack can be launched remotely. The exploit has...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gh464646/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.290227" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8609E306-3171-4B5D-AD7A-5E95C463E015", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/gh464646/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gh464646", "CVE" ]
# **Security Advisory: SQL Injection in Gym Management System (PHP) v1.0** **Advisory ID:** GMS-2024-001 **Discovered By:** ghgh --- ## **1. Affected Product** - **Product Name**: Gym Management System in PHP with Source Code - **Version**: v1.0 - **Vulnerable File**: `/dashboard/admin/submit_paym...
Security Advisory: SQL Injection in Gym Management System (PHP) v1.0
https://api.github.com/repos/gh464646/CVE/issues/1/comments
0
2025-01-04T08:02:05Z
2025-01-04T08:02:05Z
https://github.com/gh464646/CVE/issues/1
2,768,610,824
1
6,490
CVE-2025-0232
2025-01-05T22:15:05.767
A vulnerability was found in Codezips Blood Bank Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /successadmin.php. The manipulation of the argument psw leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alc9700jmo/CVE/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.290228" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:blood_bank_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB7783EB-DCFE-4253-9B26-339D9EA7F97D", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/alc9700jmo/CVE/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alc9700jmo", "CVE" ]
# Blood Bank Management System In PHP With Source Code V1.0 /successadmin.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Blood Bank Management System In PHP With Source Code ## Vendor Homepage + [homepage](https://codezips.com/php/blood-bank-management-system-in-php-with-source-code//) # AFFECTED AND/OR FIXED ...
Blood Bank Management System In PHP With Source Code V1.0 /successadmin.php SQL injection
https://api.github.com/repos/alc9700jmo/CVE/issues/7/comments
0
2025-01-04T08:07:23Z
2025-01-04T08:07:23Z
https://github.com/alc9700jmo/CVE/issues/7
2,768,616,440
7
6,491
CVE-2024-13142
2025-01-05T23:15:06.467
A vulnerability was found in ZeroWdd studentmanager 1.0. It has been declared as problematic. This vulnerability affects the function submitAddRole of the file src/main/java/com/zero/system/controller/RoleController. java. The manipulation of the argument name leads to cross site scripting. The attack can be initiated ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ZeroWdd/manager-system/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zerowdd:studentmanager:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2375E47D-661D-4707-AC3E-A71C23BEF7FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/ZeroWdd/manager-system/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ZeroWdd", "manager-system" ]
Source code name:manager-system Source code version:1.0 Source code download link:https://github.com/ZeroWdd/manager-system/archive/refs/heads/master.zip Code Audit: The submitAddRole method in src/main/java/com/zero/system/controller/RoleController. java does not filter the input name parameter ![image](https:/...
manager-system 1.0 has a storage type XSS
https://api.github.com/repos/ZeroWdd/manager-system/issues/6/comments
0
2024-12-26T13:33:23Z
2024-12-26T13:37:37Z
https://github.com/ZeroWdd/manager-system/issues/6
2,759,783,316
6
6,492
CVE-2025-0233
2025-01-05T23:15:07.320
A vulnerability was found in Codezips Project Management System 1.0. It has been classified as critical. This affects an unknown part of the file /pages/forms/course.php. The manipulation of the argument course_name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/1074923869/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.290229" }, { "source": "c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:project_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF56923B-4DFB-477A-8839-5AA94FD11344", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/1074923869/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "1074923869", "CVE" ]
# **Release Notes – Security Update for Project Management System v1.0** **Discovered By:** qinghe --- ## **Overview of the Issue** A high-severity SQL injection vulnerability has been identified in **Project Management System v1.0**. Specifically, the vulnerability resides in the file `/pages/forms/course...
Project Management System V1.0 /pages/forms/course.php SQL injection
https://api.github.com/repos/1074923869/CVE/issues/1/comments
0
2025-01-04T14:51:43Z
2025-01-04T14:51:43Z
https://github.com/1074923869/CVE/issues/1
2,768,876,012
1
6,493
CVE-2025-0336
2025-01-09T07:15:27.860
A vulnerability was found in Codezips Project Management System 1.0. It has been classified as critical. This affects an unknown part of the file /pages/forms/teacher.php. The manipulation of the argument name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/fuulof/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctii...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:project_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF56923B-4DFB-477A-8839-5AA94FD11344", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/fuulof/CVE/issues/1
[ "Exploit", "Mitigation", "Third Party Advisory" ]
github.com
[ "fuulof", "CVE" ]
# 📝 **Vulnerability Fact Sheet** --- ## **🔍 Overview** - **Product Name:** Project Management System In PHP And MYSQL With Source Code - **Version:** V1.0 - **Vulnerable File:** `/pages/forms/teacher.php` - **Vulnerability Type:** SQL Injection - **Submitter:** thankkks - **Vendor Homepage:** [Project M...
Project Management System SQL Injection
https://api.github.com/repos/fuulof/CVE/issues/1/comments
0
2025-01-06T17:04:42Z
2025-01-06T17:04:42Z
https://github.com/fuulof/CVE/issues/1
2,771,072,801
1
6,494
CVE-2025-0347
2025-01-09T10:15:07.170
A vulnerability was found in code-projects Admission Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php of the component Login. The manipulation of the argument u_id leads to sql injection. The attack can be initiated remotely. The exploit has been dis...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory", "Issue Tracking" ], "url": "https://github.com/Curious-L/-/issues/3" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anisha:admission_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48C076B-BB6E-4EEE-A714-F847EA4119DD", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/Curious-L/-/issues/3
[ "Exploit", "Third Party Advisory", "Issue Tracking" ]
github.com
[ "Curious-L", "-" ]
# code-projects.org"Admission Management System" in PHP 1.0 "index.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Admission Management System IN PHP, CSS, AND MYSQL | FREE DOWNLOAD ## Vendor Homepage + https://code-projects.org/admission-management-system-in-php-css-and-mysql-free-download/ # AFFECTE...
code-projects.org"Admission Management System" in PHP 1.0 "index.php" SQL injection
https://api.github.com/repos/Curious-L/-/issues/3/comments
0
2025-01-08T02:50:32Z
2025-01-08T02:50:32Z
https://github.com/Curious-L/-/issues/3
2,774,118,160
3
6,495
CVE-2025-0485
2025-01-15T20:15:29.400
A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been classified as problematic. Affected is an unknown function of the file /fladmin/sysconfig_doedit.php. The manipulation of the argument info leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "79" ]
79
https://github.com/Fanli2012/native-php-cms/issues/7
[ "Exploit", "Issue Tracking" ]
github.com
[ "Fanli2012", "native-php-cms" ]
In fladmin/sysconfig_doedit.php, the input content is not filtered, resulting in storage XSS. Attackers can cooperate with unauthorized access to directly insert storage XSS into the background ``` POST /fladmin/sysconfig_doedit.php HTTP/1.1 Host: 192.168.0.104 Content-Type: multipart/form-data; boundary=----WebKit...
native-php-cms has storage XSS
https://api.github.com/repos/Fanli2012/native-php-cms/issues/7/comments
0
2025-01-06T06:18:47Z
2025-01-06T06:26:44Z
https://github.com/Fanli2012/native-php-cms/issues/7
2,769,919,832
7
6,498
CVE-2025-0485
2025-01-15T20:15:29.400
A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been classified as problematic. Affected is an unknown function of the file /fladmin/sysconfig_doedit.php. The manipulation of the argument info leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "79" ]
79
https://github.com/Fanli2012/native-php-cms/issues/7#issue-2769919832
[ "Exploit", "Issue Tracking" ]
github.com
[ "Fanli2012", "native-php-cms" ]
In fladmin/sysconfig_doedit.php, the input content is not filtered, resulting in storage XSS. Attackers can cooperate with unauthorized access to directly insert storage XSS into the background ``` POST /fladmin/sysconfig_doedit.php HTTP/1.1 Host: 192.168.0.104 Content-Type: multipart/form-data; boundary=----WebKit...
native-php-cms has storage XSS
https://api.github.com/repos/Fanli2012/native-php-cms/issues/7/comments
0
2025-01-06T06:18:47Z
2025-01-06T06:26:44Z
https://github.com/Fanli2012/native-php-cms/issues/7
2,769,919,832
7
6,499
CVE-2025-0486
2025-01-15T21:15:14.960
A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "89" ]
89
https://github.com/Fanli2012/native-php-cms/issues/8
[ "Exploit", "Issue Tracking" ]
github.com
[ "Fanli2012", "native-php-cms" ]
Unfiltered input username value in fladmin/login.php allows attackers to construct malicious usernames to bypass login ![image](https://github.com/user-attachments/assets/db651aff-a904-462e-905a-448857dd6b98) http://192.168.0.104/fladmin/login.php Fill in the username field:`-1') OR 1=1#` Password is arbitrary, you...
There is a universal password for native-php-cms
https://api.github.com/repos/Fanli2012/native-php-cms/issues/8/comments
0
2025-01-06T06:35:01Z
2025-01-06T06:39:03Z
https://github.com/Fanli2012/native-php-cms/issues/8
2,769,942,639
8
6,500