cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2024-52613 | 2024-11-14T23:15:05.967 | A heap-based buffer under-read in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) via a crafted MOV video file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/justdan96/tsMuxer/issues/881"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:justdan96:tsmuxer:nightly-2024-05-12-02-01-18:*:*:*:*:*:*:*",
"matchCriteriaId": "518BE04B-2D5E-4617-95D9-AF476CEAB9B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"125"
] | 125 | https://github.com/justdan96/tsMuxer/issues/881 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"justdan96",
"tsMuxer"
] | We found heap buffer under-read in movDemuxer.cpp in the current master([cb04552](https://github.com/justdan96/tsMuxer/commit/cb0455259bb9182fba466a4905b840fed3a72646)).
This vulnerability was discovered during the analysis of a fuzzing crash caused by a different root cause.
PoC is here.
15-b.mov is in [vuln-b.... | heap buffer under-read is found in movDemuxer.cpp | https://api.github.com/repos/justdan96/tsMuxer/issues/881/comments | 0 | 2024-06-05T10:48:37Z | 2024-11-15T20:48:16Z | https://github.com/justdan96/tsMuxer/issues/881 | 2,335,562,970 | 881 | 6,399 |
CVE-2024-11256 | 2024-11-15T20:15:17.957 | A vulnerability was found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/8"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Portfolio Management System MCA Project using PHP and MySQL
## Vendor Homepage
+ https://1000projects.org/portfolio-management-system-mca-project-using-php-and-mysql.html
# AFFECT... | 100projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /login.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/8/comments | 0 | 2024-11-13T15:28:48Z | 2024-11-13T15:28:48Z | https://github.com/Hacker0xOne/CVE/issues/8 | 2,655,878,252 | 8 | 6,400 |
CVE-2024-11257 | 2024-11-15T20:15:18.253 | A vulnerability classified as critical has been found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/forgot-password.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/10"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/forgot-password.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/O... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/forgot-password.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/10/comments | 0 | 2024-11-13T15:44:08Z | 2024-11-13T15:44:10Z | https://github.com/Hacker0xOne/CVE/issues/10 | 2,655,936,915 | 10 | 6,401 |
CVE-2024-11258 | 2024-11-15T20:15:18.523 | A vulnerability classified as critical was found in 1000 Projects Beauty Parlour Management System 1.0. This vulnerability affects unknown code of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/11"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/11 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR FIXED VER... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/index.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/11/comments | 0 | 2024-11-13T15:46:44Z | 2024-11-13T15:46:44Z | https://github.com/Hacker0xOne/CVE/issues/11 | 2,655,946,469 | 11 | 6,402 |
CVE-2024-11261 | 2024-11-15T22:15:14.970 | A vulnerability, which was classified as critical, was found in SourceCodester Student Record Management System 1.0. Affected is an unknown function of the file StudentRecordManagementSystem.cpp of the component Number of Students Menu. The manipulation leads to memory corruption. Attacking locally is a requirement. Th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/12"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"119"
] | 119 | https://github.com/Hacker0xone/CVE/issues/12 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # **SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Validation Vulnerability**
## **Vulnerability Name**
+ **Input Validation Vulnerability**
## **Vulnerability Description**
In the Student Record Management System program, improper input validation allows for unexpected beh... | SourceCodester Student Record Management System in C++ with Source Code V1.0 - Input Validation Vulnerability | https://api.github.com/repos/Hacker0xOne/CVE/issues/12/comments | 0 | 2024-11-14T01:43:13Z | 2024-11-14T08:34:54Z | https://github.com/Hacker0xOne/CVE/issues/12 | 2,657,271,678 | 12 | 6,403 |
CVE-2024-11262 | 2024-11-15T23:15:10.270 | A vulnerability has been found in SourceCodester Student Record Management System 1.0 and classified as critical. Affected by this vulnerability is the function main of the component View All Student Marks. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/13"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.284719"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:student_record_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1524C11E-2F0E-4041-B60B-EA839BE0F991",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/Hacker0xone/CVE/issues/13 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # **Student Record Management System in C++ with Source Code V1.0 - Stack-based Buffer Overflow Vulnerabilities**
**Project Name:** Student Record Management System in C++
**Vulnerability Name:** Stack-based Buffer Overflow Vulnerabilities
**Vulnerability Type:** Buffer Overflow
**Severity Level:** High
... | Student Record Management System in C++ with Source Code V1.0 - Stack-based Buffer Overflow Vulnerabilities | https://api.github.com/repos/Hacker0xOne/CVE/issues/13/comments | 0 | 2024-11-14T08:37:09Z | 2024-11-14T08:39:40Z | https://github.com/Hacker0xOne/CVE/issues/13 | 2,658,025,307 | 13 | 6,404 |
CVE-2024-52762 | 2024-11-19T21:15:06.580 | A cross-site scripting (XSS) vulnerability in the component /master/header.php of Ganglia-web v3.73 to v3.76 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "tz" parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ganglia/ganglia-web/issues/382"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7E7806B-9443-4250-A789-F980E207AC13",
"versionEndExcluding": null,
"versionEndIncluding": "3.76",
"versionStartExcl... | [
"79"
] | 79 | https://github.com/ganglia/ganglia-web/issues/382 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ganglia",
"ganglia-web"
] | The first XSS release: 3.73<=Ganglia-web<3.75
Vulnerability cause:
https://github.com/ganglia/ganglia-web/blob/3.7.3/graph_all_periods.php
The parameters passed in are not restricted, and the trigger point is the parameter g.
<img width="979" alt="Snipaste_2024-11-07_21-11-39" src="https://github.com/user-attach... | There are two xss in different version ranges | https://api.github.com/repos/ganglia/ganglia-web/issues/382/comments | 0 | 2024-11-07T13:15:32Z | 2024-11-07T13:15:32Z | https://github.com/ganglia/ganglia-web/issues/382 | 2,641,005,144 | 382 | 6,405 |
CVE-2024-11488 | 2024-11-20T17:15:14.097 | A vulnerability was found in 115cms up to 20240807 and classified as problematic. This issue affects some unknown processing of the file /app/admin/view/web_user.html. The manipulation of the argument ks leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/70"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.285503"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:115cms:115cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03950909-1057-4645-B3D9-0592C6550912",
"versionEndExcluding": null,
"versionEndIncluding": "2024-08-07",
"versionStartExcl... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/70 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
115cms v8 version 20240807 is affected by multiple reflected Cross-Site Scripting (XSS) vulnerabilities.
These vulnerabilities occur due to insufficient input validation and sanitation, allowing attackers to inject malicious scripts into web pages that are then executed in the browsers of other users.
http... | Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in 115cms v8 20240807 | https://api.github.com/repos/Hebing123/cve/issues/70/comments | 1 | 2024-09-05T06:15:05Z | 2024-11-21T09:32:15Z | https://github.com/Hebing123/cve/issues/70 | 2,506,863,968 | 70 | 6,406 |
CVE-2024-11587 | 2024-11-21T13:15:03.803 | A vulnerability was found in idcCMS 1.60. It has been classified as problematic. This affects the function GetCityOptionJs of the file /inc/classProvCity.php. The manipulation of the argument idName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the publ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/75"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.285657"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:idccms:idccms:1.60:*:*:*:*:*:*:*",
"matchCriteriaId": "EDEAEBA4-6D6F-466A-805A-4CA739290434",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/75 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A reflected Cross Site Scripting (XSS) vulnerability exists in idcCMS V1.60 due to improper sanitization of the $idName parameter in `/inc/classProvCity.php`.
# Details
idcCMS V1.60 suffers from a Reflected Cross Site Scripting (XSS) vulnerability due to improper sanitization of the $idName parameter wit... | idcCMS V1.60 has a reflected XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/75/comments | 1 | 2024-11-12T11:32:29Z | 2024-11-21T09:26:12Z | https://github.com/Hebing123/cve/issues/75 | 2,651,919,647 | 75 | 6,407 |
CVE-2024-11588 | 2024-11-21T13:15:06.013 | A vulnerability was found in AVL-DiTEST-DiagDev libdoip 1.0.0. It has been rated as problematic. This issue affects the function DoIPConnection::reactOnReceivedTcpMessage of the file DoIPConnection.cpp. The manipulation leads to null pointer dereference. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.3,
"confidentialityImpact... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/AVL-DiTEST-DiagDev/libdoip/issues/11"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ct... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:avlditest:libdoip:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7243300-7B16-4672-BEA9-C4AA3D9A699E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"476"
] | 476 | https://github.com/AVL-DiTEST-DiagDev/libdoip/issues/11 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"AVL-DiTEST-DiagDev",
"libdoip"
] | In the reactOnReceivedTcpMessage method, the ROUTINGACTIVATIONREQUEST activation command dynamically allocates an array to routedClientAddress. However, when the activation command is not used and a diagnostic command (8001) is sent directly, routedClientAddress is not allocated. If it is used afterward, it causes the ... | Null Pointer Vulnerability | https://api.github.com/repos/AVL-DiTEST-DiagDev/libdoip/issues/11/comments | 1 | 2024-11-13T06:16:47Z | 2024-11-13T06:17:47Z | https://github.com/AVL-DiTEST-DiagDev/libdoip/issues/11 | 2,654,338,896 | 11 | 6,408 |
CVE-2024-11589 | 2024-11-21T13:15:06.250 | A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /expcatedit.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kevin27392/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/kevin27392/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kevin27392",
"cve"
] | # Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expcatedit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expcatedit.php SQL injection | https://api.github.com/repos/kevin27392/cve/issues/1/comments | 0 | 2024-11-16T04:39:52Z | 2024-11-16T04:39:52Z | https://github.com/kevin27392/cve/issues/1 | 2,663,750,316 | 1 | 6,409 |
CVE-2024-11590 | 2024-11-21T13:15:06.480 | A vulnerability, which was classified as critical, has been found in 1000 Projects Bookstore Management System 1.0. Affected by this issue is some unknown functionality of the file /forget_password_process.php. The manipulation of the argument unm leads to sql injection. The attack may be launched remotely. The exploit... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/1ighttack/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/1ighttack/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"1ighttack",
"CVE"
] | # 100projects Bookstore Management System PHP MySQL Project V1.0 forget_password_process.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Bookstore Management System PHP MySQL Project
## Vendor Homepage
+ https://1000projects.org/bookstore-management-system-php-mysql-project.html
# AFFECTED AND/OR FIXED VERSION(S... | 100projects Bookstore Management System PHP MySQL Project V1.0 forget_password_process.php SQL injection | https://api.github.com/repos/1ighttack/CVE/issues/1/comments | 0 | 2024-11-16T05:40:42Z | 2024-11-16T05:40:42Z | https://github.com/1ighttack/CVE/issues/1 | 2,663,852,164 | 1 | 6,410 |
CVE-2024-11591 | 2024-11-21T14:15:08.713 | A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument sername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/14"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-services.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR F... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-services.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/14/comments | 0 | 2024-11-16T14:03:31Z | 2024-11-16T14:03:32Z | https://github.com/Hacker0xOne/CVE/issues/14 | 2,664,404,665 | 14 | 6,411 |
CVE-2024-11592 | 2024-11-21T15:15:25.003 | A vulnerability has been found in 1000 Projects Beauty Parlour Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/about-us.php. The manipulation of the argument pagetitle leads to sql injection. The attack can be initiated remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/15"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/about-us.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR FIXED... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/about-us.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/15/comments | 0 | 2024-11-16T14:09:11Z | 2024-11-16T14:09:11Z | https://github.com/Hacker0xOne/CVE/issues/15 | 2,664,412,163 | 15 | 6,412 |
CVE-2024-11631 | 2024-11-23T12:15:19.760 | A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /expedit.php. The manipulation of the argument expcat leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sil3n/cve/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://itsourcecode.com/"
},
{
"source": "cna@vuldb.com",
"tags... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/sil3n/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sil3n",
"cve"
] |
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expedit.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Tailoring Management System Project In PHP With Source Code
## Vendor Homepage
+ https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-w... | Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expedit.php SQL injection | https://api.github.com/repos/sil3n/cve/issues/1/comments | 0 | 2024-11-18T02:03:49Z | 2024-11-18T02:03:50Z | https://github.com/sil3n/cve/issues/1 | 2,666,853,834 | 1 | 6,413 |
CVE-2023-7299 | 2024-11-23T13:15:04.547 | A vulnerability was found in DataGear up to 4.60. It has been declared as critical. This vulnerability affects unknown code of the file /dataSet/resolveSql. The manipulation of the argument sql leads to sql injection. The attack can be initiated remotely. Upgrading to version 4.7.0 is able to address this issue. It is ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/datageartech/datagear/issues/29"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.285658"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:datagear:datagear:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E21B63E-035C-4D02-AF6A-0093D5407D1B",
"versionEndExcluding": "4.7.0",
"versionEndIncluding": null,
"versionStartExclu... | [
"89"
] | 89 | https://github.com/datageartech/datagear/issues/29 | [
"Exploit"
] | github.com | [
"datageartech",
"datagear"
] | The /dataSet/resolveSql interface sql parameters can be template injected, resulting in rce.
just like:

| /dataSet/resolveSql interface freemarker template injection vulnerability | https://api.github.com/repos/datageartech/datagear/issues/29/comments | 1 | 2023-09-22T10:26:10Z | 2024-01-03T12:10:14Z | https://github.com/datageartech/datagear/issues/29 | 1,908,639,829 | 29 | 6,414 |
CVE-2024-11632 | 2024-11-23T14:15:17.880 | A vulnerability was found in code-projects Simple Car Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file /book_car.php. The manipulation of the argument fname/id_no/gender/email/phone/location leads to sql injection. It is possible to launch the attack remotely. The explo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sil3n/cve/issues/2"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D80D0581-09FD-4CE1-9327-CF580DF49354",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"89"
] | 89 | https://github.com/sil3n/cve/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sil3n",
"cve"
] | # code-projects Simple Car Rental System In PHP With Source Code v1.0 book_car.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Restaurant Order System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/simple-car-rental-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
##... | code-projects Simple Car Rental System In PHP With Source Code v1.0 book_car.php SQL injection | https://api.github.com/repos/sil3n/cve/issues/2/comments | 0 | 2024-11-18T02:05:39Z | 2024-11-18T02:05:39Z | https://github.com/sil3n/cve/issues/2 | 2,666,855,479 | 2 | 6,415 |
CVE-2024-53899 | 2024-11-24T16:15:06.647 | virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/pypa/virtualenv/issues/2768"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/pypa/virtualenv/pull/2771"
},
{
"source": "cve@mitre.org",
"tags": [... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:virtualenv:virtualenv:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF06C282-558B-4BD3-9260-61E491A730EC",
"versionEndExcluding": "20.26.6",
"versionEndIncluding": null,
"versionStar... | [
"77"
] | 77 | https://github.com/pypa/virtualenv/issues/2768 | [
"Exploit"
] | github.com | [
"pypa",
"virtualenv"
] | **Issue**
This issue was originally reported to Tidelift, with disclosure negotiated with the maintainer.
The activation script in `virtualenv` is command injectable via a crafted path:
```bash
envname="';uname -a;':"
mkdir "$envname"
cd "$envname"
virtualenv .
. ./bin/activate
```
```
Linux archlinu... | Command injection is possible via activation script | https://api.github.com/repos/pypa/virtualenv/issues/2768/comments | 0 | 2024-09-23T14:27:10Z | 2024-09-27T16:16:10Z | https://github.com/pypa/virtualenv/issues/2768 | 2,542,843,653 | 2,768 | 6,416 |
CVE-2024-11646 | 2024-11-25T00:15:03.743 | A vulnerability classified as critical was found in 1000 Projects Beauty Parlour Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit-services.php. The manipulation of the argument sername leads to sql injection. The attack can be launched remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/33"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/33 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-services.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR F... | 100projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-services.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/33/comments | 0 | 2024-11-18T11:54:46Z | 2024-11-18T11:54:46Z | https://github.com/ppp-src/CVE/issues/33 | 2,668,312,231 | 33 | 6,417 |
CVE-2024-11647 | 2024-11-25T01:15:04.033 | A vulnerability, which was classified as critical, has been found in 1000 Projects Beauty Parlour Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. The manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ppp-src/CVE/issues/34"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/ppp-src/CVE/issues/34 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ppp-src",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/view-appointment.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/view-appointment.php SQL injection | https://api.github.com/repos/ppp-src/CVE/issues/34/comments | 0 | 2024-11-18T11:58:53Z | 2024-11-18T11:58:53Z | https://github.com/ppp-src/CVE/issues/34 | 2,668,322,809 | 34 | 6,418 |
CVE-2024-11648 | 2024-11-25T01:15:04.687 | A vulnerability, which was classified as critical, was found in 1000 Projects Beauty Parlour Management System 1.0. This affects an unknown part of the file /admin/add-customer.php. The manipulation of the argument name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclos... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Calmgh/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Calmgh/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Calmgh",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-customer.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED AND/OR F... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/add-customer.php SQL injection | https://api.github.com/repos/Calmgh/CVE/issues/1/comments | 0 | 2024-11-19T07:16:42Z | 2024-11-19T07:16:43Z | https://github.com/Calmgh/CVE/issues/1 | 2,671,046,129 | 1 | 6,419 |
CVE-2024-11649 | 2024-11-25T02:15:15.883 | A vulnerability has been found in 1000 Projects Beauty Parlour Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/search-appointment.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/zgaz/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/zgaz/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"zgaz",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-appointment.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
# AFFECTED A... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 /admin/search-appointment.php SQL injection | https://api.github.com/repos/zgaz/CVE/issues/1/comments | 0 | 2024-11-23T12:14:41Z | 2024-11-23T12:14:41Z | https://github.com/zgaz/CVE/issues/1 | 2,685,929,304 | 1 | 6,420 |
CVE-2024-11661 | 2024-11-25T08:15:09.007 | A vulnerability was found in Codezips Free Exam Hall Seating Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file profile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. The attack can be initiate... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/anqi12301/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.285982"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:free_exam_hall_seating_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99C348E9-6BBF-4FC8-A2B8-3ED70BA03131",
"versionEndExcluding": null,
"versionEndIncluding": null,... | [
"434"
] | 434 | https://github.com/anqi12301/CVE/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"anqi12301",
"CVE"
] | # Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 profile.php Unrestricted Upload
# NAME OF AFFECTED PRODUCT(S)
+ Free Exam Hall Seating Management System In PHP with Source Code
## Vendor Homepage
+ https://codezips.com/php/free-exam-hall-seating-management-system-in-php-with-source-c... | Codezips Free Exam Hall Seating Management System In PHP with Source Code 1.0 profile.php Unrestricted Upload | https://api.github.com/repos/anqi12301/CVE/issues/1/comments | 0 | 2024-11-19T03:56:51Z | 2024-11-19T03:56:51Z | https://github.com/anqi12301/CVE/issues/1 | 2,670,648,707 | 1 | 6,421 |
CVE-2024-11663 | 2024-11-25T09:15:06.590 | A vulnerability classified as critical was found in Codezips E-Commerce Site 1.0. Affected by this vulnerability is an unknown functionality of the file search.php. The manipulation of the argument keywords leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/disinroot/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.285985"
},
{
"source": "cn... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"89"
] | 89 | https://github.com/disinroot/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"disinroot",
"CVE"
] | # Codezips E-commerce Site Using PHP With Source Code V1.0 search.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ E-commerce Site Using PHP With Source Code
## Vendor Homepage
+ https://codezips.com/php/e-commerce-site-using-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
+ xiongdaicheng ... | Codezips E-commerce Site Using PHP With Source Code V1.0 search.php SQL injection | https://api.github.com/repos/disinroot/CVE/issues/1/comments | 0 | 2024-11-19T07:38:15Z | 2024-11-19T07:40:25Z | https://github.com/disinroot/CVE/issues/1 | 2,671,125,449 | 1 | 6,422 |
CVE-2024-11673 | 2024-11-25T23:15:04.280 | A vulnerability, which was classified as problematic, has been found in 1000 Projects Bookstore Management System 1.0. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/16"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"352"
] | 352 | https://github.com/Hacker0xone/CVE/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # **Vulnerability Report**
+ **1000projects Bookstore Management System PHP MySQL Project V1.0 - Cross-Site Request Forgery (CSRF)**
## **Vulnerability Name**
+ Cross-Site Request Forgery (CSRF)
## **Basic Information**
- **Target System**: Bookstore Management System
- **Tested Parameter**: `s`
+ *... | 1000projects Bookstore Management System PHP MySQL Project V1.0 - Cross-Site Request Forgery (CSRF) | https://api.github.com/repos/Hacker0xOne/CVE/issues/16/comments | 0 | 2024-11-20T03:42:49Z | 2024-11-20T03:42:49Z | https://github.com/Hacker0xOne/CVE/issues/16 | 2,674,235,113 | 16 | 6,423 |
CVE-2024-11744 | 2024-11-26T21:15:06.483 | A vulnerability has been found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been di... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/zdwf-klm/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/zdwf-klm/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"zdwf-klm",
"CVE"
] | # 1000projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /register.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Portfolio Management System MCA Project using PHP and MySQL
## Vendor Homepage
+ https://1000projects.org/portfolio-management-system-mca-project-using-php-and-mysql.html
# AF... | 1000projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /register.php SQL injection | https://api.github.com/repos/zdwf-klm/CVE/issues/1/comments | 0 | 2024-11-22T02:16:04Z | 2024-11-22T02:16:04Z | https://github.com/zdwf-klm/CVE/issues/1 | 2,681,536,616 | 1 | 6,424 |
CVE-2024-11817 | 2024-11-26T23:15:04.990 | A vulnerability was found in PHPGurukul User Registration & Login and User Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The e... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/wackymaker/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://phpgurukul.com/"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F48F8CEA-7E27-491E-8C39-4898F0AE4432",
"versionEndExcluding": null,
"versionEndI... | [
"89"
] | 89 | https://github.com/wackymaker/CVE/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"wackymaker",
"CVE"
] | # Phpgurukul User Registration & Login and User Management System With admin panel V1.0 /admin/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ User Registration & Login and User Management System With admin panel
## Vendor Homepage
+ https://phpgurukul.com/user-registration-login-and-user-management-system-... | Phpgurukul User Registration & Login and User Management System With admin panel V1.0 /admin/index.php SQL injection | https://api.github.com/repos/wackymaker/CVE/issues/1/comments | 0 | 2024-11-24T06:54:43Z | 2024-11-24T06:54:43Z | https://github.com/wackymaker/CVE/issues/1 | 2,687,247,188 | 1 | 6,425 |
CVE-2024-11818 | 2024-11-27T00:15:17.727 | A vulnerability classified as critical has been found in PHPGurukul User Registration & Login and User Management System 1.0. This affects an unknown part of the file /signup.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wackymaker/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://phpgurukul.com/"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F48F8CEA-7E27-491E-8C39-4898F0AE4432",
"versionEndExcluding": null,
"versionEndI... | [
"89"
] | 89 | https://github.com/wackymaker/CVE/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wackymaker",
"CVE"
] | # Phpgurukul User Registration & Login and User Management System With admin panel V1.0 /signup.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ User Registration & Login and User Management System With admin panel
## Vendor Homepage
+ https://phpgurukul.com/user-registration-login-and-user-management-system-with-... | Phpgurukul User Registration & Login and User Management System With admin panel V1.0 /signup.php SQL injection | https://api.github.com/repos/wackymaker/CVE/issues/3/comments | 0 | 2024-11-24T07:38:18Z | 2024-11-24T07:38:18Z | https://github.com/wackymaker/CVE/issues/3 | 2,687,310,551 | 3 | 6,426 |
CVE-2024-11819 | 2024-11-27T00:15:17.890 | A vulnerability classified as critical was found in 1000 Projects Portfolio Management System MCA 1.0. This vulnerability affects unknown code of the file /forgot_password_process.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wackymaker/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/wackymaker/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wackymaker",
"CVE"
] | # 1000projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /forgot_password_process.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Portfolio Management System MCA Project using PHP and MySQL
## Vendor Homepage
+ https://1000projects.org/portfolio-management-system-mca-project-using-php-and-m... | 1000projects Portfolio Management System MCA Project using PHP and MySQL V1.0 /forgot_password_process.php SQL injection | https://api.github.com/repos/wackymaker/CVE/issues/2/comments | 0 | 2024-11-24T06:58:23Z | 2024-11-24T06:58:23Z | https://github.com/wackymaker/CVE/issues/2 | 2,687,249,859 | 2 | 6,427 |
CVE-2024-11962 | 2024-11-28T16:15:06.307 | A vulnerability classified as critical was found in code-projects Simple Car Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/w0r1dtr33/cve/issues/1"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D80D0581-09FD-4CE1-9327-CF580DF49354",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"89"
] | 89 | https://github.com/w0r1dtr33/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"w0r1dtr33",
"cve"
] | # code-projects Simple Car Rental System In PHP With Source Code v1.0 login.php SQL injection
# usernameOF AFFECTED PRODUCT(S)
+ Restaurant Order System In PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/simple-car-rental-system-in-php-with-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## su... | code-projects Simple Car Rental System In PHP With Source Code v1.0 login.php SQL injection | https://api.github.com/repos/w0r1dtr33/cve/issues/1/comments | 0 | 2024-11-18T01:56:11Z | 2024-11-26T02:39:13Z | https://github.com/w0r1dtr33/cve/issues/1 | 2,666,846,797 | 1 | 6,428 |
CVE-2024-11963 | 2024-11-28T16:15:06.993 | A vulnerability, which was classified as critical, has been found in code-projects Responsive Hotel Site 1.0. Affected by this issue is some unknown functionality of the file /admin/room.php. The manipulation of the argument troom leads to sql injection. The attack may be launched remotely. The exploit has been disclos... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/w0r1dtr33/cve/issues/2"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/w0r1dtr33/cve/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"w0r1dtr33",
"cve"
] | # code-projects Responsive Hotel Site Using PHP With Source Code v1.0 room.php SQL injection
# troom OF AFFECTED PRODUCT(S)
+ Responsive Hotel Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/responsive-hotel-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter... | code-projects Responsive Hotel Site Using PHP With Source Code v1.0 room.php SQL injection | https://api.github.com/repos/w0r1dtr33/cve/issues/2/comments | 0 | 2024-11-18T01:59:25Z | 2024-11-26T02:53:02Z | https://github.com/w0r1dtr33/cve/issues/2 | 2,666,849,791 | 2 | 6,429 |
CVE-2024-11964 | 2024-11-28T17:15:18.500 | A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management system 1.0. This affects an unknown part of the file /user/index.php. The manipulation of the argument emailid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurora0x1/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://phpgurukul.com/"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Aurora0x1/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Aurora0x1",
"CVE"
] | # Phpgurukul Complaint Management system V1.0 /user/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Complaint Management system
## Vendor Homepage
- https://phpgurukul.com/complaint-management-sytem/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
- Aurora0x1
## Vulnerable File
- /use... | Phpgurukul Complaint Management system V1.0 /user/index.php SQL injection | https://api.github.com/repos/Aurora0x1/CVE/issues/1/comments | 0 | 2024-11-26T12:04:42Z | 2024-11-26T12:04:42Z | https://github.com/Aurora0x1/CVE/issues/1 | 2,694,436,002 | 1 | 6,430 |
CVE-2024-11965 | 2024-11-28T17:15:19.383 | A vulnerability has been found in PHPGurukul Complaint Management system 1.0 and classified as critical. This vulnerability affects unknown code of the file /user/reset-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurora0x1/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://phpgurukul.com/"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Aurora0x1/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Aurora0x1",
"CVE"
] | # Phpgurukul Complaint Management system V1.0 /user/reset-password.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Complaint Management system
## Vendor Homepage
- https://phpgurukul.com/complaint-management-sytem/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
- Aurora0x1
## Vulnerable File
... | Phpgurukul Complaint Management system V1.0 /user/reset-password.php SQL injection | https://api.github.com/repos/Aurora0x1/CVE/issues/2/comments | 0 | 2024-11-26T12:12:34Z | 2024-11-26T12:12:34Z | https://github.com/Aurora0x1/CVE/issues/2 | 2,694,458,823 | 2 | 6,431 |
CVE-2024-11966 | 2024-11-28T18:15:07.547 | A vulnerability was found in PHPGurukul Complaint Management system 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the publi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurora0x1/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://phpgurukul.com/"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Aurora0x1/CVE/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Aurora0x1",
"CVE"
] | # Phpgurukul Complaint Management system V1.0 /admin/index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Complaint Management system
## Vendor Homepage
- https://phpgurukul.com/complaint-management-sytem/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
- Aurora0x1
## Vulnerable File
- /ad... | Phpgurukul Complaint Management system V1.0 /admin/index.php SQL injection | https://api.github.com/repos/Aurora0x1/CVE/issues/3/comments | 0 | 2024-11-26T12:17:07Z | 2024-11-26T12:17:08Z | https://github.com/Aurora0x1/CVE/issues/3 | 2,694,472,180 | 3 | 6,432 |
CVE-2024-11967 | 2024-11-28T18:15:07.780 | A vulnerability was found in PHPGurukul Complaint Management system 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/reset-password.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurora0x1/CVE/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://phpgurukul.com/"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Aurora0x1/CVE/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Aurora0x1",
"CVE"
] | # Phpgurukul Complaint Management system V1.0 /admin/reset-password.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Complaint Management system
## Vendor Homepage
- https://phpgurukul.com/complaint-management-sytem/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
- Aurora0x1
## Vulnerable File... | Phpgurukul Complaint Management system V1.0 /admin/reset-password.php SQL injection | https://api.github.com/repos/Aurora0x1/CVE/issues/4/comments | 0 | 2024-11-26T12:22:58Z | 2024-11-26T12:22:58Z | https://github.com/Aurora0x1/CVE/issues/4 | 2,694,487,435 | 4 | 6,433 |
CVE-2024-11970 | 2024-11-28T22:15:14.277 | A vulnerability classified as critical has been found in code-projects Concert Ticket Ordering System 1.0. Affected is an unknown function of the file /tour(cor).php. The manipulation of the argument mai leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/halhalz/1/issues/1"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anisha:concert_ticket_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4ED485D9-FEA3-4405-B971-6C7A4B2DCFFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/halhalz/1/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"halhalz",
"1"
] | # code-projects.org"Concert Ticket Ordering System" in PHP 1.0 "tour(cor).php" SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Concert Ticket Ordering System IN PHP, CSS, JavaScript, AND MYSQL | FREE DOWNLOAD
## Vendor Homepage
+ https://code-projects.org/concert-ticket-ordering-system-in-php-css-javascript-a... | code-projects.org"Concert Ticket Ordering System" in PHP 1.0 "tour(cor).php" SQL injection | https://api.github.com/repos/halhalz/1/issues/1/comments | 0 | 2024-11-28T03:15:56Z | 2024-11-28T03:15:56Z | https://github.com/halhalz/1/issues/1 | 2,700,612,926 | 1 | 6,434 |
CVE-2024-12180 | 2024-12-04T22:15:22.140 | A vulnerability classified as problematic has been found in DedeCMS 5.7.116. Affected is an unknown function of the file /member/article_add.php. The manipulation of the argument body leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be use... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/76"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.286902"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8",
"versionEndExcluding": "5.7.116",
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/76 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A stored Cross-Site Scripting (XSS) vulnerability has been identified in the DedeCMS V5.7.116 content management system. The vulnerability exists due to insufficient filtering of the `body` parameter in the `/member/article_add.php` script. This issue allows an attacker to inject malicious scripts into artic... | DedeCMS V5.7.116 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/76/comments | 1 | 2024-11-27T07:03:17Z | 2024-12-06T02:28:49Z | https://github.com/Hebing123/cve/issues/76 | 2,697,386,582 | 76 | 6,435 |
CVE-2024-12181 | 2024-12-04T22:15:22.360 | A vulnerability classified as problematic was found in DedeCMS 5.7.116. Affected by this vulnerability is an unknown functionality of the file /member/uploads_add.php of the component SWF File Handler. The manipulation of the argument mediatype leads to cross site scripting. The attack can be launched remotely. The exp... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/77"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.286903"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8",
"versionEndExcluding": "5.7.116",
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/77 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
DedeCMS V5.7.116 is affected by a stored cross-site scripting vulnerability that can be exploited by an attacker to upload a malicious SWF file, which can lead to XSS attacks. This vulnerability exists due to insufficient input validation and sanitization of user-supplied data.
# Details
Log in and go to... | DedeCMS V5.7.116 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/77/comments | 1 | 2024-11-27T08:15:37Z | 2024-12-06T02:29:05Z | https://github.com/Hebing123/cve/issues/77 | 2,697,588,984 | 77 | 6,436 |
CVE-2024-12182 | 2024-12-04T23:15:04.703 | A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7.116. Affected by this issue is some unknown functionality of the file /member/soft_add.php. The manipulation of the argument body leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/78"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.286904"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8",
"versionEndExcluding": "5.7.116",
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/78 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A stored Cross-Site Scripting (XSS) vulnerability has been identified in the DedeCMS V5.7.116 content management system. The vulnerability exists due to insufficient filtering of the `body` parameter in the `/member/soft_add.php` script.
This issue allows an attacker to inject malicious scripts into softwa... | DedeCMS V5.7.116 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/78/comments | 1 | 2024-11-27T09:33:27Z | 2024-12-06T02:29:22Z | https://github.com/Hebing123/cve/issues/78 | 2,697,823,090 | 78 | 6,437 |
CVE-2024-12183 | 2024-12-04T23:15:05.760 | A vulnerability, which was classified as problematic, was found in DedeCMS 5.7.116. This affects the function RemoveXSS of the file /plus/carbuyaction.php of the component HTTP POST Request Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disc... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/79"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.286905"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75A7C6F6-9828-495D-B2F4-55E6EDEB61A8",
"versionEndExcluding": "5.7.116",
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/79 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
A stored XSS vulnerability has been identified in DedeCMS V5.7.116.
Attackers can exploit this vulnerability by maliciously inserting an XSS payload in the comment section during the purchase of goods.
# Details
The vulnerability is located in the file `plus/carbuyaction.php`. Our analysis indicates that ... | DedeCMS V5.7.116 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/79/comments | 1 | 2024-11-28T03:04:01Z | 2024-12-06T02:29:41Z | https://github.com/Hebing123/cve/issues/79 | 2,700,547,563 | 79 | 6,438 |
CVE-2024-12187 | 2024-12-05T01:15:04.740 | A vulnerability was found in 1000 Projects Library Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /showbook.php. The manipulation of the argument q leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/PunyHunter/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B5BC36-12E9-4DE1-B238-C53C11EEAFB7",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/PunyHunter/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"PunyHunter",
"CVE"
] | # 1000projects Library Management System BCA 4th Semester Minor Project using SQL and PHP V1.0 /showbook.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Library Management System BCA 4th Semester Minor Project using SQL and PHP
## Vendor Homepage
- [homepage](https://1000projects.org/library-management-sy... | 1000projects Library Management System BCA 4th Semester Minor Project using SQL and PHP V1.0 /showbook.php SQL injection | https://api.github.com/repos/PunyHunter/CVE/issues/1/comments | 0 | 2024-12-02T08:57:35Z | 2024-12-02T08:57:35Z | https://github.com/PunyHunter/CVE/issues/1 | 2,711,114,017 | 1 | 6,439 |
CVE-2024-12188 | 2024-12-05T01:15:04.943 | A vulnerability was found in 1000 Projects Library Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /brains/stu.php. The manipulation of the argument useri leads to sql injection. The attack can be launched remotely. The exploit has been dis... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/SkGoing/CVE-repo_00/issues/4"
},
{
"source": "cna@vuldb.com",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B5BC36-12E9-4DE1-B238-C53C11EEAFB7",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/SkGoing/CVE-repo_00/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"SkGoing",
"CVE-repo_00"
] | # 1000projects Library Management System BCA 4th Semester Minor Project using SQL and PHP V1.0 /brains/stu.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Library Management System BCA 4th Semester Minor Project using SQL and PHP
## Vendor Homepage
- [homepage](https://1000projects.org/library-management-... | 1000projects Library Management System BCA 4th Semester Minor Project using SQL and PHP V1.0 /brains/stu.php SQL injection | https://api.github.com/repos/SkGoing/CVE-repo_00/issues/4/comments | 0 | 2024-12-02T09:10:17Z | 2024-12-02T09:10:18Z | https://github.com/SkGoing/CVE-repo_00/issues/4 | 2,711,146,439 | 4 | 6,440 |
CVE-2024-12228 | 2024-12-05T14:15:20.123 | A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. Affected is an unknown function of the file /admin/user-search.php. The manipulation of the argument search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the pub... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/PunyHunter/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://phpgurukul.com/"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/PunyHunter/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"PunyHunter",
"CVE"
] | # Phpgurukul Complaint Management system V1.0 /admin/user-search.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Complaint Management system
## Vendor Homepage
- https://phpgurukul.com/complaint-management-sytem/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
- punnyhunter
## Vulnerable File
... | Phpgurukul Complaint Management system V1.0 /admin/user-search.php SQL injection | https://api.github.com/repos/PunyHunter/CVE/issues/2/comments | 0 | 2024-12-02T09:00:54Z | 2024-12-02T09:00:54Z | https://github.com/PunyHunter/CVE/issues/2 | 2,711,122,865 | 2 | 6,441 |
CVE-2024-12229 | 2024-12-05T15:15:09.050 | A vulnerability classified as critical was found in PHPGurukul Complaint Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/complaint-search.php. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been di... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/qiyes233/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://phpgurukul.com/"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/qiyes233/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"qiyes233",
"CVE"
] | # Phpgurukul Complaint Management system V1.0 /admin/complaint-search.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Complaint Management system
## Vendor Homepage
- https://phpgurukul.com/complaint-management-sytem/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
- qiye
## Vulnerable File
... | Phpgurukul Complaint Management system V1.0 /admin/complaint-search.php SQL injection | https://api.github.com/repos/qiyes233/CVE/issues/1/comments | 0 | 2024-12-02T09:20:57Z | 2024-12-02T09:20:57Z | https://github.com/qiyes233/CVE/issues/1 | 2,711,169,928 | 1 | 6,442 |
CVE-2024-12231 | 2024-12-05T16:15:24.933 | A vulnerability, which was classified as critical, was found in CodeZips Project Management System 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/SkGoing/CVE-repo_00/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.286977"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:project_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF56923B-4DFB-477A-8839-5AA94FD11344",
"versionEndExcluding": null,
"versionEndIncluding": null,
"v... | [
"89"
] | 89 | https://github.com/SkGoing/CVE-repo_00/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"SkGoing",
"CVE-repo_00"
] | # CodeZips Project Management System In PHP And MYSQL With Source Code V1.0 /index.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Project Management System In PHP And MYSQL With Source Code
## Vendor Homepage
- [homepage](https://codezips.com/php/project-management-system-in-php-and-mysql-with-source-cod... | CodeZips Project Management System In PHP And MYSQL With Source Code V1.0 /index.php SQL injection | https://api.github.com/repos/SkGoing/CVE-repo_00/issues/3/comments | 0 | 2024-12-02T09:08:51Z | 2024-12-02T09:08:51Z | https://github.com/SkGoing/CVE-repo_00/issues/3 | 2,711,143,358 | 3 | 6,443 |
CVE-2024-12234 | 2024-12-05T17:15:11.213 | A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-customer-detailed.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hacker0xone/CVE/issues/17"
},
{
"source": "cna@vuldb.com",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/Hacker0xone/CVE/issues/17 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hacker0xone",
"CVE"
] | # 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-customer-detailed.php SQL injection
## NAME OF AFFECTED PRODUCT(S)
+ Beauty Parlour Management System PHP SQLite Project
## Vendor Homepage
+ https://1000projects.org/beauty-parlour-management-system-php-sqlite-project.html
## AFFEC... | 1000projects Beauty Parlour Management System PHP SQLite Project V1.0 admin/edit-customer-detailed.php SQL injection | https://api.github.com/repos/Hacker0xOne/CVE/issues/17/comments | 0 | 2024-12-04T09:23:20Z | 2024-12-04T09:23:20Z | https://github.com/Hacker0xOne/CVE/issues/17 | 2,717,081,474 | 17 | 6,444 |
CVE-2024-30961 | 2024-12-05T23:15:05.030 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the error-thrown mechanism in nav2_bt_navigator. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-planning/navigation2/issues/4175"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"94"
] | 94 | https://github.com/ros-planning/navigation2/issues/4175 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-planning",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | the mechanism defect of `bt_action_server ->on_cleanup()` may lead to UAF | https://api.github.com/repos/ros-navigation/navigation2/issues/4175/comments | 8 | 2024-03-11T15:25:02Z | 2024-03-14T17:05:16Z | https://github.com/ros-navigation/navigation2/issues/4175 | 2,179,426,419 | 4,175 | 6,445 |
CVE-2024-30962 | 2024-12-05T23:15:05.147 | Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the nav2_amcl process | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-planning/navigation2/issues/4177"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"120"
] | 120 | https://github.com/ros-planning/navigation2/issues/4177 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-planning",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repositor... | Validate messages in subscription callbacks for critical error in population | https://api.github.com/repos/ros-navigation/navigation2/issues/4177/comments | 6 | 2024-03-12T16:04:46Z | 2024-05-02T14:30:43Z | https://github.com/ros-navigation/navigation2/issues/4177 | 2,182,048,705 | 4,177 | 6,446 |
CVE-2024-38921 | 2024-12-06T22:15:19.600 | Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter`/amcl z_rand ` . | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4379"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"416"
] | 416 | https://github.com/ros-navigation/navigation2/issues/4379 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repositor... | 18 bugs (UAF) in `nav2_amcl` by setting dynamic parameters | https://api.github.com/repos/ros-navigation/navigation2/issues/4379/comments | 6 | 2024-05-30T14:43:04Z | 2024-06-05T16:47:20Z | https://github.com/ros-navigation/navigation2/issues/4379 | 2,325,854,595 | 4,379 | 6,447 |
CVE-2024-38922 | 2024-12-06T22:15:19.720 | Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a heap overflow in the nav2_amcl process. This vulnerability is triggered via sending a crafted message to the component /initialpose. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/open-navigation/navigation2/issues/4307"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/open-navigation/navigation2/issues/4307 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"open-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | some special msg onto `/initialpose` could lead to heap-buffer-overflow bug | https://api.github.com/repos/ros-navigation/navigation2/issues/4307/comments | 10 | 2024-05-07T10:32:09Z | 2024-06-11T15:39:28Z | https://github.com/ros-navigation/navigation2/issues/4307 | 2,282,891,923 | 4,307 | 6,448 |
CVE-2024-38922 | 2024-12-06T22:15:19.720 | Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a heap overflow in the nav2_amcl process. This vulnerability is triggered via sending a crafted message to the component /initialpose. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/open-navigation/navigation2/issues/4307"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/ros-navigation/navigation2/issues/4294 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | validate msg onto `/initialpose` would result in a stack-buffer-overflow bug in `nav2_amcl` | https://api.github.com/repos/ros-navigation/navigation2/issues/4294/comments | 1 | 2024-05-03T12:07:57Z | 2024-05-09T05:44:07Z | https://github.com/ros-navigation/navigation2/issues/4294 | 2,277,546,456 | 4,294 | 6,449 |
CVE-2024-41644 | 2024-12-06T22:15:20.450 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via the dyn_param_handler_ component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4496"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4496 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | Completely shutdown dynamic_param callback threads instead of only `dyn_param_handler_.reset()` | https://api.github.com/repos/ros-navigation/navigation2/issues/4496/comments | 5 | 2024-06-26T07:35:14Z | 2024-08-30T06:45:24Z | https://github.com/ros-navigation/navigation2/issues/4496 | 2,374,591,094 | 4,496 | 6,450 |
CVE-2024-41645 | 2024-12-06T22:15:20.563 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2__amcl. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4497"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4497 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | ## Bug report
**Required Info:**
- Operating System:
- <!-- OS and version (e.g. Windows 10, Ubuntu 16.04...) --> ubuntu 22.04
- ROS2 Version:
- <!-- ROS2 distribution and install method (e.g. Foxy binaries, Dashing source...) --> humble
- Version or commit hash:
- <!-- from source: output of `git -C ... | [nav2_costmap] UAF bug caused by incomplete closed `dynamicParametersCallback` thread in `Inflation_layer_` | https://api.github.com/repos/ros-navigation/navigation2/issues/4497/comments | 1 | 2024-06-26T07:51:11Z | 2024-06-27T15:20:35Z | https://github.com/ros-navigation/navigation2/issues/4497 | 2,374,628,765 | 4,497 | 6,451 |
CVE-2024-41646 | 2024-12-06T22:15:20.683 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_dwb_controller. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4437"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4437 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right reposit... | NullPtr bug during the `getRobotPose()` calculation of `costmap_ros_` in `nav2_controller` | https://api.github.com/repos/ros-navigation/navigation2/issues/4437/comments | 4 | 2024-06-14T20:22:16Z | 2024-06-24T17:40:52Z | https://github.com/ros-navigation/navigation2/issues/4437 | 2,354,037,707 | 4,437 | 6,452 |
CVE-2024-41647 | 2024-12-06T22:15:20.807 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_mppi_controller. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4436"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"732"
] | 732 | https://github.com/ros-navigation/navigation2/issues/4436 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | NullPtr bug during the `computeVelocityCommands()` during shutdown | https://api.github.com/repos/ros-navigation/navigation2/issues/4436/comments | 5 | 2024-06-14T18:04:35Z | 2024-06-24T17:40:36Z | https://github.com/ros-navigation/navigation2/issues/4436 | 2,353,847,380 | 4,436 | 6,453 |
CVE-2024-41648 | 2024-12-06T22:15:20.920 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_regulated_pure_pursuit_controller. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4438"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4438 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repositor... | NullPtr bug during the `computeVelocityCommands()` calculation of `nav2_regulated_pure_pursuit_controller` | https://api.github.com/repos/ros-navigation/navigation2/issues/4438/comments | 1 | 2024-06-14T21:09:26Z | 2024-06-18T08:54:37Z | https://github.com/ros-navigation/navigation2/issues/4438 | 2,354,120,170 | 4,438 | 6,454 |
CVE-2024-41649 | 2024-12-06T22:15:21.037 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the executor_thread_. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/open-navigation/navigation2/issues/4323"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/open-navigation/navigation2/issues/4323 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"open-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | NullPtr bug occurs during costmap-calculation of `controller_server` | https://api.github.com/repos/ros-navigation/navigation2/issues/4323/comments | 5 | 2024-05-10T07:18:36Z | 2024-05-31T15:41:25Z | https://github.com/ros-navigation/navigation2/issues/4323 | 2,289,118,828 | 4,323 | 6,455 |
CVE-2024-41650 | 2024-12-06T22:15:21.163 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_costmap_2d. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4489"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"281"
] | 281 | https://github.com/ros-navigation/navigation2/issues/4489 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | ## Bug report
**Required Info:**
- Operating System:
- <!-- OS and version (e.g. Windows 10, Ubuntu 16.04...) --> ubuntu 22.04
- ROS2 Version:
- <!-- ROS2 distribution and install method (e.g. Foxy binaries, Dashing source...) --> humble
- Version or commit hash:
- <!-- from source: output of `git -C ... | [nav2_costmap] UAF bug caused by the exit mechanism flaw in class `ClearCostmapService` | https://api.github.com/repos/ros-navigation/navigation2/issues/4489/comments | 1 | 2024-06-25T10:24:22Z | 2024-06-26T16:32:10Z | https://github.com/ros-navigation/navigation2/issues/4489 | 2,372,307,138 | 4,489 | 6,456 |
CVE-2024-44852 | 2024-12-06T22:15:21.277 | Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a segmentation violation via the component theta_star::ThetaStar::isUnsafeToPlan(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/open-navigation/navigation2/issues/4464"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"763"
] | 763 | https://github.com/open-navigation/navigation2/issues/4464 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"open-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | Invalidate Pointer Accessed during `isUnsafeToPlan()` calculation of `nav2_theta_planner` | https://api.github.com/repos/ros-navigation/navigation2/issues/4464/comments | 1 | 2024-06-24T12:40:53Z | 2024-06-24T12:43:37Z | https://github.com/ros-navigation/navigation2/issues/4464 | 2,370,151,679 | 4,464 | 6,457 |
CVE-2024-44853 | 2024-12-06T22:15:21.390 | Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component computeControl(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4547"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/ros-navigation/navigation2/issues/4547 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right reposit... | [nav2_controller] nullPtr bug during `comupteControl()` | https://api.github.com/repos/ros-navigation/navigation2/issues/4547/comments | 0 | 2024-07-21T06:48:05Z | 2024-07-22T17:05:48Z | https://github.com/ros-navigation/navigation2/issues/4547 | 2,421,255,890 | 4,547 | 6,458 |
CVE-2024-44854 | 2024-12-06T22:15:21.500 | Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component smoothPlan(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4538"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/ros-navigation/navigation2/issues/4538 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] | <!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repository?... | [nav2_smoother] nullptr bug during `smooth_plan()` | https://api.github.com/repos/ros-navigation/navigation2/issues/4538/comments | 3 | 2024-07-16T20:02:08Z | 2024-07-19T16:44:40Z | https://github.com/ros-navigation/navigation2/issues/4538 | 2,411,949,445 | 4,538 | 6,459 |
CVE-2024-44855 | 2024-12-06T22:15:21.630 | Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component nav2_navfn_planner(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/open-navigation/navigation2/issues/4466"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/open-navigation/navigation2/issues/4466 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"open-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right repositor... | NullPointer Accessed during `makePlan` calculation of nav2_navfn_planner | https://api.github.com/repos/ros-navigation/navigation2/issues/4466/comments | 1 | 2024-06-24T12:54:09Z | 2024-06-24T12:55:32Z | https://github.com/ros-navigation/navigation2/issues/4466 | 2,370,183,275 | 4,466 | 6,460 |
CVE-2024-44856 | 2024-12-06T22:15:21.753 | Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble was discovered to contain a NULL pointer dereference via the component nav2_smac_planner(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GoesM/ROS-CVE-CNVDs"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ros-navigation/navigation2/issues/4468"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"matchCriteriaId": "0ADE698F-A518-4691-A7FA-2DEE8C079361",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"476"
] | 476 | https://github.com/ros-navigation/navigation2/issues/4468 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ros-navigation",
"navigation2"
] |
<!--
For general questions, please ask on ROS answers: https://answers.ros.org, make sure to include at least the `ros2` tag and the rosdistro version you are running, e.g. `ardent`.
For general design discussions, please post on discourse: https://discourse.ros.org/c/ng-ros
Not sure if this is the right reposit... | NullPointer Accessed during `findCircumscribedCost` calculation of nav2_smac_planner | https://api.github.com/repos/ros-navigation/navigation2/issues/4468/comments | 1 | 2024-06-24T13:09:15Z | 2024-06-24T13:09:36Z | https://github.com/ros-navigation/navigation2/issues/4468 | 2,370,218,387 | 4,468 | 6,461 |
CVE-2024-12353 | 2024-12-09T02:15:18.920 | A vulnerability, which was classified as problematic, has been found in SourceCodester Phone Contact Manager System 1.0. This issue affects the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation of the argument name leads to improper input validation. Attacking locally is a requiremen... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 1.7,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jasontimwong/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.287273"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"20"
] | 20 | https://github.com/jasontimwong/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jasontimwong",
"CVE"
] | # SourceCodester Phone Contact Manager System in C++ with Source Code Buffer Pollution Leading to Data Integrity Corruption and Potential Security Risks
## Vulnerability Information
### Affected Components
- **System/Software Name**: Phone Contact Manager System
- **Version**: Current Implementation
### Pr... | SourceCodester Phone Contact Manager System in C++ with Source Code Buffer Pollution Leading to Data Integrity Corruption and Potential Security Risks | https://api.github.com/repos/jasontimwong/CVE/issues/1/comments | 0 | 2024-12-05T16:31:14Z | 2024-12-05T16:35:36Z | https://github.com/jasontimwong/CVE/issues/1 | 2,720,880,661 | 1 | 6,462 |
CVE-2024-12354 | 2024-12-09T02:15:19.120 | A vulnerability, which was classified as critical, was found in SourceCodester Phone Contact Manager System 1.0. Affected is the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation leads to buffer overflow. It is possible to launch the attack on the local host. The exploit has been dis... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jasontimwong/CVE/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.287274"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/jasontimwong/CVE/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jasontimwong",
"CVE"
] | # SourceCodester Phone Contact Manager System in C++ with Source Code Improper Input Verification Can Lead to Abnormal Circuit Logic and Resource Consumption Risks
## Vulnerability Information
### Affected Components
- **System/Software Name**: Phone Contact Manager System
- **Version**: Current Implementatio... | SourceCodester Phone Contact Manager System in C++ with Source Code Improper Input Verification Can Lead to Abnormal Circuit Logic and Resource Consumption Risks | https://api.github.com/repos/jasontimwong/CVE/issues/2/comments | 0 | 2024-12-05T17:53:03Z | 2024-12-05T23:05:37Z | https://github.com/jasontimwong/CVE/issues/2 | 2,721,057,081 | 2 | 6,463 |
CVE-2024-12497 | 2024-12-12T02:15:22.367 | A vulnerability classified as critical has been found in 1000 Projects Attendance Tracking Management System 1.0. Affected is an unknown function of the file /admin/check_admin_login.php. The manipulation of the argument admin_user_name leads to sql injection. It is possible to launch the attack remotely. The exploit h... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Ta0k1a/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tag... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4",
"versionEndExcluding": null,
"versionEndIncluding": null... | [
"89"
] | 89 | https://github.com/Ta0k1a/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Ta0k1a",
"CVE"
] | # 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/check_admin_login.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Attendance Tracking Management System PHP & MySQL Project
## Vendor Homepage
- [homepage](https://1000projects.org/attendance-tracking-management-system-ph... | 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/check_admin_login.php SQL injection | https://api.github.com/repos/Ta0k1a/CVE/issues/1/comments | 0 | 2024-12-09T12:51:14Z | 2024-12-09T12:51:14Z | https://github.com/Ta0k1a/CVE/issues/1 | 2,726,967,119 | 1 | 6,464 |
CVE-2024-12841 | 2024-12-20T19:15:06.097 | A vulnerability was found in Emlog Pro up to 2.4.1. It has been classified as problematic. This affects an unknown part of the file /admin/tag.php. The manipulation of the argument keyword leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/emlog/emlog/issues/305"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.289077"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.1",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/305 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"emlog",
"emlog"
] | # Summary
emlog pro 2.4.1 is affected by multiple reflected Cross-Site Scripting (XSS) vulnerabilities.
These vulnerabilities occur due to insufficient input validation and sanitation, allowing attackers to inject malicious scripts into web pages that are then executed in the browsers of other users.
# Details
This... | Multiple Reflected Cross-Site Scripting (XSS) Vulnerabilities in emlog pro 2.4.1 | https://api.github.com/repos/emlog/emlog/issues/305/comments | 2 | 2024-12-13T02:55:33Z | 2025-03-28T04:43:36Z | https://github.com/emlog/emlog/issues/305 | 2,737,265,718 | 305 | 6,465 |
CVE-2024-12845 | 2024-12-20T22:15:24.727 | A vulnerability classified as problematic was found in Emlog Pro up to 2.4.1. Affected by this vulnerability is an unknown functionality in the library /include/lib/common.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/emlog/emlog/issues/306"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.289081"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "46A6111E-D96A-425D-AAC4-64CEBA8C0B28",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.1",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/306 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"emlog",
"emlog"
] | # Summary
A reflected Cross Site Scripting (XSS) vulnerability exists in emlog pro 2.4.1 due to improper sanitization of the $msg parameter in /include/lib/common.php.
# Details
This vulnerability can be exploited by an attacker to inject malicious scripts into the web application, which can then be executed in the ... | emlog pro 2.4.1 has a reflected XSS vulnerability | https://api.github.com/repos/emlog/emlog/issues/306/comments | 2 | 2024-12-13T04:00:15Z | 2025-03-28T04:43:53Z | https://github.com/emlog/emlog/issues/306 | 2,737,341,754 | 306 | 6,466 |
CVE-2024-12846 | 2024-12-21T05:15:07.373 | A vulnerability, which was classified as problematic, has been found in Emlog Pro up to 2.4.1. Affected by this issue is some unknown functionality of the file /admin/link.php. The manipulation of the argument siteurl/icon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/307"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.289082"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "B449A14E-7C7E-4541-95AB-C2E55846E4D3",
"versionEndExcluding": "2.4.1",
"versionEndIncluding": null,
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/307 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Summary
A stored XSS vulnerability exists in emlog pro 2.4.1 which allows attackers to execute arbitrary HTML code.
# Details
Because `/admin/link.php` has CSRF problems, attackers can use XSS to cooperate with CSRF to attack.
The `siteurl` and `icon` parameters have XSS vulnerabilities.

+ Attendance Tracking Management System PHP & MySQL Project
## Vendor Homepage
+ [homepage](https://1000projects.org/attendance-tracking-management-system-php-mysql-pr... | 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/faculty_action.php SQL injection | https://api.github.com/repos/onupset/CVE/issues/1/comments | 0 | 2024-12-21T09:31:47Z | 2024-12-21T09:31:47Z | https://github.com/onupset/CVE/issues/1 | 2,753,862,860 | 1 | 6,468 |
CVE-2024-12899 | 2024-12-23T01:15:07.020 | A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/course_action.php. The manipulation of the argument course_code leads to sql injection. The attack may be initiated remotely. The exploit has... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Murrayzed/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4",
"versionEndExcluding": null,
"versionEndIncluding": null... | [
"89"
] | 89 | https://github.com/Murrayzed/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Murrayzed",
"CVE"
] | # 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/course_action.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Attendance Tracking Management System PHP & MySQL Project
## Vendor Homepage
+ [homepage](https://1000projects.org/attendance-tracking-management-system-php-mysql-pro... | 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/course_action.php SQL injection | https://api.github.com/repos/Murrayzed/CVE/issues/1/comments | 0 | 2024-12-22T08:36:57Z | 2024-12-22T08:36:57Z | https://github.com/Murrayzed/CVE/issues/1 | 2,754,552,122 | 1 | 6,469 |
CVE-2024-12940 | 2024-12-26T07:15:11.637 | A vulnerability has been found in 1000 Projects Attendance Tracking Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/student_action.php. The manipulation of the argument student_id leads to sql injection. The attack can be initiated remotely. The exploit has b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bug3536/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4",
"versionEndExcluding": null,
"versionEndIncluding": null... | [
"89"
] | 89 | https://github.com/bug3536/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"bug3536",
"CVE"
] | # 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/student_action.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Attendance Tracking Management System PHP & MySQL Project
## Vendor Homepage
+ [homepage](https://1000projects.org/attendance-tracking-management-system-php-mysql-pr... | 1000projects Attendance Tracking Management System PHP & MySQL Project V1.0 /admin/student_action.php SQL injection | https://api.github.com/repos/bug3536/CVE/issues/1/comments | 0 | 2024-12-24T06:43:51Z | 2024-12-24T06:43:51Z | https://github.com/bug3536/CVE/issues/1 | 2,757,281,911 | 1 | 6,470 |
CVE-2024-13004 | 2024-12-29T07:15:05.643 | A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. This affects an unknown part of the file /admin/category.php. The manipulation of the argument state leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alc9700jmo/CVE/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://phpgurukul.com/"
},
{
"source": "cna@vuldb.com",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/alc9700jmo/CVE/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"alc9700jmo",
"CVE"
] | # Phpgurukul Complaint Management system V1.0 /admin/category.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
- Complaint Management system
## Vendor Homepage
- https://phpgurukul.com/complaint-management-sytem/
# AFFECTED AND/OR FIXED VERSION(S)
## submitter
- alc9700
## Vulnerable File
- /a... | Phpgurukul Complaint Management system V1.0 /admin/category.php SQL injection | https://api.github.com/repos/alc9700jmo/CVE/issues/6/comments | 0 | 2024-12-27T13:58:14Z | 2024-12-27T13:58:15Z | https://github.com/alc9700jmo/CVE/issues/6 | 2,760,919,377 | 6 | 6,471 |
CVE-2024-13008 | 2024-12-29T10:15:05.853 | A vulnerability has been found in code-projects Responsive Hotel Site 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/newsletter.php. The manipulation of the argument eid leads to sql injection. The attack can be launched remotely. The exploit has been discl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Err-4O4/cve/issues/1"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/Err-4O4/cve/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Err-4O4",
"cve"
] | # code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection
# eidOF AFFECTED PRODUCT(S)
- Responsive Hotel Site Using PHP With Source Code
## Vendor Homepage
- https://code-projects.org/responsive-hotel-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
... | code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection | https://api.github.com/repos/Err-4O4/cve/issues/1/comments | 0 | 2024-12-29T07:24:18Z | 2024-12-29T07:24:18Z | https://github.com/Err-4O4/cve/issues/1 | 2,762,139,940 | 1 | 6,472 |
CVE-2024-13008 | 2024-12-29T10:15:05.853 | A vulnerability has been found in code-projects Responsive Hotel Site 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/newsletter.php. The manipulation of the argument eid leads to sql injection. The attack can be launched remotely. The exploit has been discl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://code-projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Err-4O4/cve/issues/1"
},
{
"source":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C10207-0B0E-455F-B5AE-2CAA6C98BA15",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"89"
] | 89 | https://github.com/Lanxiy7th/lx_CVE_report-/issues/18 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Lanxiy7th",
"lx_CVE_report-"
] | # code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection
# eidOF AFFECTED PRODUCT(S)
+ Responsive Hotel Site Using PHP With Source Code
## Vendor Homepage
+ https://code-projects.org/responsive-hotel-site-using-php-source-code/
# AFFECTED AND/OR FIXED VERSION(S)
## submit... | code-projects Responsive Hotel Site Using PHP With Source Code v1.0 newsletter.php SQL injection | https://api.github.com/repos/Lanxiy7th/lx_CVE_report-/issues/18/comments | 0 | 2024-12-28T03:56:11Z | 2024-12-28T03:56:12Z | https://github.com/Lanxiy7th/lx_CVE_report-/issues/18 | 2,761,422,178 | 18 | 6,473 |
CVE-2024-13037 | 2024-12-30T04:15:05.200 | A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been classified as critical. Affected is the function attendance_report of the file /admin/report.php. The manipulation of the argument course_id leads to sql injection. It is possible to launch the attack remotely. The exploit... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://1000projects.org/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matias-a11y/cve/issues/2"
},
{
"sourc... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4",
"versionEndExcluding": null,
"versionEndIncluding": null... | [
"89"
] | 89 | https://github.com/matias-a11y/cve/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matias-a11y",
"cve"
] | # **Step-by-Step Vulnerability Report**
## **Step 1: Context and System Overview**
- **Application Name**: Attendance Tracking Management System (PHP & MySQL)
- **Version**: 1.0
- **Vulnerable Endpoint**: `/admin/report.php`
- **Discovered By**: mxh9934
- **Vendor Homepage**: [Attendance Tracking Mana... | Attendance Tracking Management System SQL | https://api.github.com/repos/matias-a11y/cve/issues/2/comments | 0 | 2024-12-29T14:24:23Z | 2024-12-29T14:24:23Z | https://github.com/matias-a11y/cve/issues/2 | 2,762,272,987 | 2 | 6,474 |
CVE-2024-13132 | 2025-01-05T05:15:06.400 | A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/309"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/309#issue-275531... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.3",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/309 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Description
Emlog pro 2.4.3 is vulnerable to XSS in admin/article.php
# Root Cause
The server retrieves the parameters passed by the browser, concatenates them to form a URL address, and then returns it to the browser

#... | emlog pro 2.4.3 has a reflected XSS vulnerability in article.php | https://api.github.com/repos/emlog/emlog/issues/309/comments | 2 | 2024-12-23T06:21:09Z | 2025-03-28T04:44:14Z | https://github.com/emlog/emlog/issues/309 | 2,755,317,359 | 309 | 6,475 |
CVE-2024-13132 | 2025-01-05T05:15:06.400 | A vulnerability classified as problematic was found in Emlog Pro up to 2.4.3. This vulnerability affects unknown code of the file /admin/article.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and ma... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/309"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/309#issue-275531... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.3",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/309#issue-2755317359 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Description
Emlog pro 2.4.3 is vulnerable to XSS in admin/article.php
# Root Cause
The server retrieves the parameters passed by the browser, concatenates them to form a URL address, and then returns it to the browser

#... | emlog pro 2.4.3 has a reflected XSS vulnerability in article.php | https://api.github.com/repos/emlog/emlog/issues/309/comments | 2 | 2024-12-23T06:21:09Z | 2025-03-28T04:44:14Z | https://github.com/emlog/emlog/issues/309 | 2,755,317,359 | 309 | 6,476 |
CVE-2024-13135 | 2025-01-05T09:15:05.240 | A vulnerability has been found in Emlog Pro 2.4.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/twitter.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/311"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/311#issue-275540... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:2.4.3:*:*:*:pro:*:*:*",
"matchCriteriaId": "790999A9-DC94-42E9-B5B3-CA10F4BF0E0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/311 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Description
Emlog pro 2.4.3 is vulnerable to XSS in admin/twitter.php.Attackers can add malicious JavaScript scripts to the URL, and the server will concatenate the malicious scripts into the URL and return them to the browser, ultimately causing XSS vulnerabilities
# Root Case
The server retrieves the parameter... | emlog pro 2.4.3 has a reflected XSS vulnerability in twitter.php | https://api.github.com/repos/emlog/emlog/issues/311/comments | 2 | 2024-12-23T07:24:38Z | 2025-03-28T04:44:33Z | https://github.com/emlog/emlog/issues/311 | 2,755,404,584 | 311 | 6,477 |
CVE-2024-13135 | 2025-01-05T09:15:05.240 | A vulnerability has been found in Emlog Pro 2.4.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/twitter.php of the component Subpage Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/311"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/311#issue-275540... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:2.4.3:*:*:*:pro:*:*:*",
"matchCriteriaId": "790999A9-DC94-42E9-B5B3-CA10F4BF0E0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/311#issue-2755404584 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Description
Emlog pro 2.4.3 is vulnerable to XSS in admin/twitter.php.Attackers can add malicious JavaScript scripts to the URL, and the server will concatenate the malicious scripts into the URL and return them to the browser, ultimately causing XSS vulnerabilities
# Root Case
The server retrieves the parameter... | emlog pro 2.4.3 has a reflected XSS vulnerability in twitter.php | https://api.github.com/repos/emlog/emlog/issues/311/comments | 2 | 2024-12-23T07:24:38Z | 2025-03-28T04:44:33Z | https://github.com/emlog/emlog/issues/311 | 2,755,404,584 | 311 | 6,478 |
CVE-2024-13136 | 2025-01-05T09:15:06.320 | A vulnerability was found in wangl1989 mysiteforme 1.0 and classified as critical. Affected by this issue is the function rememberMeManager of the file src/main/java/com/mysiteforme/admin/config/ShiroConfig.java. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wangl1989/mysiteforme/issues/52"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wangl1989/mysiteforme/issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"502"
] | 502 | https://github.com/wangl1989/mysiteforme/issues/52 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"wangl1989",
"mysiteforme"
] | Code Audit:
src/main/java/com/mysiteforme/admin/config/ShiroConfig.java The rememberMeManager method in leaks the key 2AvVhdsgUs0FSA3SDFAdeg==, which can directly cause remote command execution.

Vulnerability exploitation:
!... | Mysiteforme 1.0 has Remote Command Execution | https://api.github.com/repos/wangl1989/mysiteforme/issues/52/comments | 0 | 2024-12-24T12:03:30Z | 2025-01-12T12:01:59Z | https://github.com/wangl1989/mysiteforme/issues/52 | 2,757,682,365 | 52 | 6,479 |
CVE-2024-13136 | 2025-01-05T09:15:06.320 | A vulnerability was found in wangl1989 mysiteforme 1.0 and classified as critical. Affected by this issue is the function rememberMeManager of the file src/main/java/com/mysiteforme/admin/config/ShiroConfig.java. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wangl1989/mysiteforme/issues/52"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wangl1989/mysiteforme/issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"502"
] | 502 | https://github.com/wangl1989/mysiteforme/issues/52#issue-2757682365 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"wangl1989",
"mysiteforme"
] | Code Audit:
src/main/java/com/mysiteforme/admin/config/ShiroConfig.java The rememberMeManager method in leaks the key 2AvVhdsgUs0FSA3SDFAdeg==, which can directly cause remote command execution.

Vulnerability exploitation:
!... | Mysiteforme 1.0 has Remote Command Execution | https://api.github.com/repos/wangl1989/mysiteforme/issues/52/comments | 0 | 2024-12-24T12:03:30Z | 2025-01-12T12:01:59Z | https://github.com/wangl1989/mysiteforme/issues/52 | 2,757,682,365 | 52 | 6,480 |
CVE-2024-13137 | 2025-01-05T10:15:06.707 | A vulnerability was found in wangl1989 mysiteforme 1.0. It has been classified as problematic. This affects the function RestResponse of the file src/main/java/com/mysiteforme/admin/controller/system/SiteController. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The expl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wangl1989/mysiteforme/issues/54"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wangl1989/mysiteforme/issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/wangl1989/mysiteforme/issues/54 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"wangl1989",
"mysiteforme"
] | Code Audit:
In src/main/java/com/mysiteforme/admin/controller/system/SiteController. java, the edit method did not filter the incoming data, resulting in the storage of XSS





Follow up with uploadLocalImg, the general process is to read the file based on ... | Mysiteforme 1.0 has SSRF | https://api.github.com/repos/wangl1989/mysiteforme/issues/56/comments | 1 | 2024-12-24T14:32:54Z | 2025-02-11T16:07:58Z | https://github.com/wangl1989/mysiteforme/issues/56 | 2,757,876,365 | 56 | 6,485 |
CVE-2024-13139 | 2025-01-05T11:15:07.247 | A vulnerability was found in wangl1989 mysiteforme 1.0. It has been rated as critical. This issue affects the function doContent of the file src/main/java/com/mysiteform/admin/controller/system/FileController. The manipulation of the argument content leads to server-side request forgery. The attack may be initiated rem... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wangl1989/mysiteforme/issues/56"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wangl1989/mysiteforme/issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "95184907-049E-4E3A-9876-690FB450BA26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"918"
] | 918 | https://github.com/wangl1989/mysiteforme/issues/56#issue-2757876365 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"wangl1989",
"mysiteforme"
] | Code Audit:
The doContent method in src/main/java/com/mysiteform/admin/controller/system/FileController. java does not filter the incoming content

Follow up with uploadLocalImg, the general process is to read the file based on ... | Mysiteforme 1.0 has SSRF | https://api.github.com/repos/wangl1989/mysiteforme/issues/56/comments | 1 | 2024-12-24T14:32:54Z | 2025-02-11T16:07:58Z | https://github.com/wangl1989/mysiteforme/issues/56 | 2,757,876,365 | 56 | 6,486 |
CVE-2024-13140 | 2025-01-05T12:15:05.473 | A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/312"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/312#issue-275854... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.3",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/312 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Summary
An XSS vulnerability has been discovered in emlog pro 2.4.3. The vulnerability stems from the fact that `/admin/article.php` does not filter malicious SVG files. This vulnerability allows an attacker with content editing permissions to exploit the system by uploading an SVG file containing malicious XML code... | emlog pro 2.4.3 Stored XSS Vulnerability in /admin/article.php | https://api.github.com/repos/emlog/emlog/issues/312/comments | 2 | 2024-12-25T06:37:01Z | 2025-03-28T04:43:16Z | https://github.com/emlog/emlog/issues/312 | 2,758,546,837 | 312 | 6,487 |
CVE-2024-13140 | 2025-01-05T12:15:05.473 | A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely.... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/312"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emlog/emlog/issues/312#issue-275854... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "A8FB7B59-8EC5-4925-8746-415CE377E073",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.3",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/312#issue-2758546837 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emlog",
"emlog"
] | # Summary
An XSS vulnerability has been discovered in emlog pro 2.4.3. The vulnerability stems from the fact that `/admin/article.php` does not filter malicious SVG files. This vulnerability allows an attacker with content editing permissions to exploit the system by uploading an SVG file containing malicious XML code... | emlog pro 2.4.3 Stored XSS Vulnerability in /admin/article.php | https://api.github.com/repos/emlog/emlog/issues/312/comments | 2 | 2024-12-25T06:37:01Z | 2025-03-28T04:43:16Z | https://github.com/emlog/emlog/issues/312 | 2,758,546,837 | 312 | 6,488 |
CVE-2024-13141 | 2025-01-05T15:15:17.257 | A vulnerability classified as problematic was found in osuuu LightPicture up to 1.2.2. This vulnerability affects unknown code of the file /api/upload of the component SVG File Upload Handler. The manipulation of the argument file leads to cross site scripting. The attack can be initiated remotely. The exploit has been... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/83"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.290224"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osuuu:lightpicture:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1EF5E0-DD84-4D9A-8408-482F1BFDB5BC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"79"
] | 79 | https://github.com/Hebing123/cve/issues/83 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | # Summary
osuuu LightPicture 1.2.2 version is vulnerable to a stored Cross-Site Scripting (XSS) attack. The vulnerability exists in the system's settings where users with the ability to upload images are allowed to upload SVG files by default.
# Details
The vulnerability arises because the system does not sufficient... | osuuu LightPicture 1.2.2 Stored XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/83/comments | 1 | 2024-12-25T03:18:08Z | 2025-03-21T02:38:49Z | https://github.com/Hebing123/cve/issues/83 | 2,758,447,373 | 83 | 6,489 |
CVE-2025-0231 | 2025-01-05T22:15:05.540 | A vulnerability has been found in Codezips Gym Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard/admin/submit_payments.php. The manipulation of the argument m_id leads to sql injection. The attack can be launched remotely. The exploit has... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gh464646/CVE/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.290227"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8609E306-3171-4B5D-AD7A-5E95C463E015",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"89"
] | 89 | https://github.com/gh464646/CVE/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gh464646",
"CVE"
] | # **Security Advisory: SQL Injection in Gym Management System (PHP) v1.0**
**Advisory ID:** GMS-2024-001
**Discovered By:** ghgh
---
## **1. Affected Product**
- **Product Name**: Gym Management System in PHP with Source Code
- **Version**: v1.0
- **Vulnerable File**: `/dashboard/admin/submit_paym... | Security Advisory: SQL Injection in Gym Management System (PHP) v1.0 | https://api.github.com/repos/gh464646/CVE/issues/1/comments | 0 | 2025-01-04T08:02:05Z | 2025-01-04T08:02:05Z | https://github.com/gh464646/CVE/issues/1 | 2,768,610,824 | 1 | 6,490 |
CVE-2025-0232 | 2025-01-05T22:15:05.767 | A vulnerability was found in Codezips Blood Bank Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /successadmin.php. The manipulation of the argument psw leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the p... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alc9700jmo/CVE/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.290228"
},
{
"source": "c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codezips:blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB7783EB-DCFE-4253-9B26-339D9EA7F97D",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"89"
] | 89 | https://github.com/alc9700jmo/CVE/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"alc9700jmo",
"CVE"
] | # Blood Bank Management System In PHP With Source Code V1.0 /successadmin.php SQL injection
# NAME OF AFFECTED PRODUCT(S)
+ Blood Bank Management System In PHP With Source Code
## Vendor Homepage
+ [homepage](https://codezips.com/php/blood-bank-management-system-in-php-with-source-code//)
# AFFECTED AND/OR FIXED ... | Blood Bank Management System In PHP With Source Code V1.0 /successadmin.php SQL injection | https://api.github.com/repos/alc9700jmo/CVE/issues/7/comments | 0 | 2025-01-04T08:07:23Z | 2025-01-04T08:07:23Z | https://github.com/alc9700jmo/CVE/issues/7 | 2,768,616,440 | 7 | 6,491 |
CVE-2024-13142 | 2025-01-05T23:15:06.467 | A vulnerability was found in ZeroWdd studentmanager 1.0. It has been declared as problematic. This vulnerability affects the function submitAddRole of the file src/main/java/com/zero/system/controller/RoleController. java. The manipulation of the argument name leads to cross site scripting. The attack can be initiated ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ZeroWdd/manager-system/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.2... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zerowdd:studentmanager:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2375E47D-661D-4707-AC3E-A71C23BEF7FB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"79"
] | 79 | https://github.com/ZeroWdd/manager-system/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ZeroWdd",
"manager-system"
] | Source code name:manager-system
Source code version:1.0
Source code download link:https://github.com/ZeroWdd/manager-system/archive/refs/heads/master.zip
Code Audit:
The submitAddRole method in src/main/java/com/zero/system/controller/RoleController. java does not filter the input name parameter

+ Admission Management System IN PHP, CSS, AND MYSQL | FREE DOWNLOAD
## Vendor Homepage
+ https://code-projects.org/admission-management-system-in-php-css-and-mysql-free-download/
# AFFECTE... | code-projects.org"Admission Management System" in PHP 1.0 "index.php" SQL injection | https://api.github.com/repos/Curious-L/-/issues/3/comments | 0 | 2025-01-08T02:50:32Z | 2025-01-08T02:50:32Z | https://github.com/Curious-L/-/issues/3 | 2,774,118,160 | 3 | 6,495 |
CVE-2025-0485 | 2025-01-15T20:15:29.400 | A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been classified as problematic. Affected is an unknown function of the file /fladmin/sysconfig_doedit.php. The manipulation of the argument info leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"79"
] | 79 | https://github.com/Fanli2012/native-php-cms/issues/7 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Fanli2012",
"native-php-cms"
] | In fladmin/sysconfig_doedit.php, the input content is not filtered, resulting in storage XSS. Attackers can cooperate with unauthorized access to directly insert storage XSS into the background
```
POST /fladmin/sysconfig_doedit.php HTTP/1.1
Host: 192.168.0.104
Content-Type: multipart/form-data; boundary=----WebKit... | native-php-cms has storage XSS | https://api.github.com/repos/Fanli2012/native-php-cms/issues/7/comments | 0 | 2025-01-06T06:18:47Z | 2025-01-06T06:26:44Z | https://github.com/Fanli2012/native-php-cms/issues/7 | 2,769,919,832 | 7 | 6,498 |
CVE-2025-0485 | 2025-01-15T20:15:29.400 | A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been classified as problematic. Affected is an unknown function of the file /fladmin/sysconfig_doedit.php. The manipulation of the argument info leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"79"
] | 79 | https://github.com/Fanli2012/native-php-cms/issues/7#issue-2769919832 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Fanli2012",
"native-php-cms"
] | In fladmin/sysconfig_doedit.php, the input content is not filtered, resulting in storage XSS. Attackers can cooperate with unauthorized access to directly insert storage XSS into the background
```
POST /fladmin/sysconfig_doedit.php HTTP/1.1
Host: 192.168.0.104
Content-Type: multipart/form-data; boundary=----WebKit... | native-php-cms has storage XSS | https://api.github.com/repos/Fanli2012/native-php-cms/issues/7/comments | 0 | 2025-01-06T06:18:47Z | 2025-01-06T06:26:44Z | https://github.com/Fanli2012/native-php-cms/issues/7 | 2,769,919,832 | 7 | 6,499 |
CVE-2025-0486 | 2025-01-15T21:15:14.960 | A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Fanli2012/native-php-cms... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"89"
] | 89 | https://github.com/Fanli2012/native-php-cms/issues/8 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Fanli2012",
"native-php-cms"
] | Unfiltered input username value in fladmin/login.php allows attackers to construct malicious usernames to bypass login

http://192.168.0.104/fladmin/login.php
Fill in the username field:`-1') OR 1=1#`
Password is arbitrary, you... | There is a universal password for native-php-cms | https://api.github.com/repos/Fanli2012/native-php-cms/issues/8/comments | 0 | 2025-01-06T06:35:01Z | 2025-01-06T06:39:03Z | https://github.com/Fanli2012/native-php-cms/issues/8 | 2,769,942,639 | 8 | 6,500 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.