cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2025-0486
2025-01-15T21:15:14.960
A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "89" ]
89
https://github.com/Fanli2012/native-php-cms/issues/8#issue-2769942639
[ "Exploit", "Issue Tracking" ]
github.com
[ "Fanli2012", "native-php-cms" ]
Unfiltered input username value in fladmin/login.php allows attackers to construct malicious usernames to bypass login ![image](https://github.com/user-attachments/assets/db651aff-a904-462e-905a-448857dd6b98) http://192.168.0.104/fladmin/login.php Fill in the username field:`-1') OR 1=1#` Password is arbitrary, you...
There is a universal password for native-php-cms
https://api.github.com/repos/Fanli2012/native-php-cms/issues/8/comments
0
2025-01-06T06:35:01Z
2025-01-06T06:39:03Z
https://github.com/Fanli2012/native-php-cms/issues/8
2,769,942,639
8
6,501
CVE-2025-0487
2025-01-15T21:15:15.160
A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/9" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/9#issue-2769962332" }, { "source...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "89" ]
89
https://github.com/Fanli2012/native-php-cms/issues/9
[ "Exploit" ]
github.com
[ "Fanli2012", "native-php-cms" ]
The input id parameter is not filtered in fladmin/cat_edit.php, resulting in error injection. Attackers can directly inject some data ![image](https://github.com/user-attachments/assets/6f51c961-5aaa-4af9-983e-079d65b4da56) No login required:http://192.168.0.104/fladmin/cat_edit.php?id=extractvalue(1,concat(0x5c,user...
fladmin/cat_edit.php SQL injection
https://api.github.com/repos/Fanli2012/native-php-cms/issues/9/comments
0
2025-01-06T06:48:34Z
2025-01-06T06:48:34Z
https://github.com/Fanli2012/native-php-cms/issues/9
2,769,962,332
9
6,502
CVE-2025-0487
2025-01-15T21:15:15.160
A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/9" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/9#issue-2769962332" }, { "source...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "89" ]
89
https://github.com/Fanli2012/native-php-cms/issues/9#issue-2769962332
[ "Exploit" ]
github.com
[ "Fanli2012", "native-php-cms" ]
The input id parameter is not filtered in fladmin/cat_edit.php, resulting in error injection. Attackers can directly inject some data ![image](https://github.com/user-attachments/assets/6f51c961-5aaa-4af9-983e-079d65b4da56) No login required:http://192.168.0.104/fladmin/cat_edit.php?id=extractvalue(1,concat(0x5c,user...
fladmin/cat_edit.php SQL injection
https://api.github.com/repos/Fanli2012/native-php-cms/issues/9/comments
0
2025-01-06T06:48:34Z
2025-01-06T06:48:34Z
https://github.com/Fanli2012/native-php-cms/issues/9
2,769,962,332
9
6,503
CVE-2025-0491
2025-01-15T22:15:26.990
A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. Affected is an unknown function of the file /fladmin/cat_dodel.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/13" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cm...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "89" ]
89
https://github.com/Fanli2012/native-php-cms/issues/13
[ "Exploit", "Issue Tracking" ]
github.com
[ "Fanli2012", "native-php-cms" ]
Failure to filter the input id parameter value in fladmin/cat_dodel.php results in error injection, allowing attackers to directly inject some data ![image](https://github.com/user-attachments/assets/4ae6d093-ba30-4cbc-b1a7-a08a3534d27d) http://192.168.0.104/fladmin/cat_dodel.php?id=extractvalue(1,concat(0x5c,user(),...
fladmin/cat_dodel.php SQL injection
https://api.github.com/repos/Fanli2012/native-php-cms/issues/13/comments
0
2025-01-06T07:27:37Z
2025-01-06T07:27:37Z
https://github.com/Fanli2012/native-php-cms/issues/13
2,770,022,466
13
6,504
CVE-2025-0491
2025-01-15T22:15:26.990
A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. Affected is an unknown function of the file /fladmin/cat_dodel.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cms/issues/13" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Fanli2012/native-php-cm...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC6224D5-0DC6-4449-9621-E63E6FBE9F5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "89" ]
89
https://github.com/Fanli2012/native-php-cms/issues/13#issue-2770022466
[ "Exploit", "Issue Tracking" ]
github.com
[ "Fanli2012", "native-php-cms" ]
Failure to filter the input id parameter value in fladmin/cat_dodel.php results in error injection, allowing attackers to directly inject some data ![image](https://github.com/user-attachments/assets/4ae6d093-ba30-4cbc-b1a7-a08a3534d27d) http://192.168.0.104/fladmin/cat_dodel.php?id=extractvalue(1,concat(0x5c,user(),...
fladmin/cat_dodel.php SQL injection
https://api.github.com/repos/Fanli2012/native-php-cms/issues/13/comments
0
2025-01-06T07:27:37Z
2025-01-06T07:27:37Z
https://github.com/Fanli2012/native-php-cms/issues/13
2,770,022,466
13
6,505
CVE-2025-0527
2025-01-17T14:15:32.840
A vulnerability classified as critical was found in code-projects Admission Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /signupconfirm.php. The manipulation of the argument in_eml leads to sql injection. The attack can be launched remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory", "Issue Tracking" ], "url": "https://github.com/Curious-L/-/issues/4" }, { "source":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anisha:admission_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48C076B-BB6E-4EEE-A714-F847EA4119DD", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/Curious-L/-/issues/4
[ "Exploit", "Third Party Advisory", "Issue Tracking" ]
github.com
[ "Curious-L", "-" ]
# code-projects.org"Admission Management System" in PHP 1.0 "signupconfirm.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Admission Management System IN PHP, CSS, AND MYSQL | FREE DOWNLOAD ## Vendor Homepage + https://code-projects.org/admission-management-system-in-php-css-and-mysql-free-download/ #...
code-projects.org"Admission Management System" in PHP 1.0 "signupconfirm.php" SQL injection
https://api.github.com/repos/Curious-L/-/issues/4/comments
0
2025-01-09T10:23:13Z
2025-02-27T08:16:17Z
https://github.com/Curious-L/-/issues/4
2,777,417,739
4
6,506
CVE-2024-57035
2025-01-17T21:15:10.100
WeGIA v3.2.0 is vulnerable to SQL Injection viathe nextPage parameter in /controle/control.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nilsonLazarin/WeGIA/issues/827" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nmmorette/vulnerabili...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wegia:wegia:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0071E4AD-1CE5-4E69-ABB0-94C615FDC583", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "89" ]
89
https://github.com/nilsonLazarin/WeGIA/issues/827
[ "Exploit", "Issue Tracking" ]
github.com
[ "nilsonLazarin", "WeGIA" ]
## Description A **SQL Injection** vulnerability was identified in the `nextPage` parameter of the `/WeGIA/controle/control.php` endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data. ## Vulnerable Parameter nextPage...
Vulnerability Report - SQL Injection Vulnerability in nextPage Parameter on control.php Endpoint
https://api.github.com/repos/LabRedesCefetRJ/WeGIA/issues/827/comments
0
2024-12-10T14:27:20Z
2024-12-18T23:39:08Z
https://github.com/LabRedesCefetRJ/WeGIA/issues/827
2,730,278,928
827
6,507
CVE-2025-0540
2025-01-17T21:15:11.037
A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expadd.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-project-in-php-with-sou...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 expadd.php SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/1/comments
0
2025-01-13T07:05:01Z
2025-01-23T09:32:03Z
https://github.com/magic2353112890/cve/issues/1
2,783,182,077
1
6,508
CVE-2025-0541
2025-01-17T22:15:29.337
A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/edit_member.php. The manipulation of the argument name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nbeisss/CVE/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8609E306-3171-4B5D-AD7A-5E95C463E015", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/nbeisss/CVE/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nbeisss", "CVE" ]
# **Security Advisory: SQL Injection in Gym Management System (PHP) v1.0** **Discovered By:** nbeisss --- ## **1. Affected Product** - **Product Name**: Gym Management System in PHP with Source Code - **Version**: v1.0 - **Vulnerable File**: `/dashboard/admin/edit_member.php` - **Parameter**: `nam...
Security Advisory: SQL Injection in Gym Management System (PHP) v1.0
https://api.github.com/repos/nbeisss/CVE/issues/1/comments
0
2025-01-13T15:23:04Z
2025-01-13T15:23:04Z
https://github.com/nbeisss/CVE/issues/1
2,784,323,486
1
6,509
CVE-2025-0561
2025-01-19T00:15:25.077
A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and ma...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yunhai666/cve/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2822E78-3BA7-4DFA-9CCE-39AB33ABA296", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/yunhai666/cve/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yunhai666", "cve" ]
# Itsourcecode Farm Management System In PHP v1.0 add-pig.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Farm Management System In PHP ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter + weiwei-abc ...
Itsourcecode Farm Management System In PHP v1.0 add-pig.php SQL injection
https://api.github.com/repos/yunhai666/cve/issues/1/comments
0
2025-01-16T12:22:34Z
2025-01-16T12:22:34Z
https://github.com/yunhai666/cve/issues/1
2,792,588,805
1
6,510
CVE-2025-0562
2025-01-19T02:15:24.380
A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/health_status_entry.php. The manipulation of the argument usrid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LiuSir5211314/-sir/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.292523" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8609E306-3171-4B5D-AD7A-5E95C463E015", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "89" ]
89
https://github.com/LiuSir5211314/-sir/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LiuSir5211314", "-sir" ]
# **Security Advisory: SQL Injection in CodeZips Gym Management System (PHP) v1.0** **Discovered By:刘sir --- ## **1. Affected Product** - **Product Name**: Gym Management System in PHP with Source Code - **Version**: v1.0 - **Vulnerable File**: `/dashboard/admin/health_status_entry.php` - **Parameter**: `usri...
# **Security Advisory: SQL Injection in CodeZips Gym Management System (PHP) v1.0**--------------CVE-2025-0562
https://api.github.com/repos/LiuSir5211314/cve/issues/1/comments
0
2025-01-17T03:16:08Z
2025-01-23T10:29:29Z
https://github.com/LiuSir5211314/cve/issues/1
2,794,397,887
1
6,511
CVE-2025-0563
2025-01-19T02:15:24.560
A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been classified as critical. Affected is an unknown function of the file /dash/update.php. The manipulation of the argument uname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LiuSir5211314/-sir/issues/2" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anisha:fantasy-cricket:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EDA23A28-2D50-44DC-B909-1D97717613D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "89" ]
89
https://github.com/LiuSir5211314/-sir/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LiuSir5211314", "-sir" ]
# code-projects.org"Fantasy-Cricket" in PHP 1.0 "update.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Fantasy-Cricket IN PHP, CSS, JavaScript, AND MYSQL | FREE DOWNLOAD ## Vendor Homepage + https://code-projects.org/fantasy-cricket-in-php-css-javascript-and-mysql-free-download/ # AFFECTED AND/OR FIXED VERSION...
code-projects.org"Fantasy-Cricket" in PHP 1.0 "update.php" SQL injection----------CVE-2025-0563
https://api.github.com/repos/LiuSir5211314/cve/issues/2/comments
0
2025-01-17T03:20:22Z
2025-01-23T10:28:48Z
https://github.com/LiuSir5211314/cve/issues/2
2,794,406,362
2
6,512
CVE-2025-0564
2025-01-19T04:15:07.090
A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /authenticate.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LiuSir5211314/-sir/issues/3" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anisha:fantasy-cricket:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EDA23A28-2D50-44DC-B909-1D97717613D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "89" ]
89
https://github.com/LiuSir5211314/-sir/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LiuSir5211314", "-sir" ]
# code-projects.org"Fantasy-Cricket" in PHP 1.0 "authenticate.php" SQL injection # NAME OF AFFECTED PRODUCT(S) + Fantasy-Cricket IN PHP, CSS, JavaScript, AND MYSQL | FREE DOWNLOAD ## Vendor Homepage + https://code-projects.org/fantasy-cricket-in-php-css-javascript-and-mysql-free-download/ # AFFECTED AND/OR FIXED V...
# code-projects.org"Fantasy-Cricket" in PHP 1.0 "authenticate.php" SQL injection ---------------CVE-2025-0564
https://api.github.com/repos/LiuSir5211314/cve/issues/3/comments
0
2025-01-17T03:23:16Z
2025-01-23T10:27:43Z
https://github.com/LiuSir5211314/cve/issues/3
2,794,412,021
3
6,513
CVE-2025-0582
2025-01-20T03:15:08.930
A vulnerability classified as critical was found in itsourcecode Farm Management System up to 1.0. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigphoto leads to unrestricted upload. The attack can be initiated remotely.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yunhai666/cve/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "434" ]
434
https://github.com/yunhai666/cve/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yunhai666", "cve" ]
# Itsourcecode Farm Management System In PHP v1.0 add-pig.php Arbitrary Code Injection # NAME OF AFFECTED PRODUCT(S) - Farm Management System In PHP ## Vendor Homepage - https://itsourcecode.com/free-projects/php-project/farm-management-system-in-php-with-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submit...
Itsourcecode Farm Management System In PHP v1.0 add-pig.php Code Injection
https://api.github.com/repos/yunhai666/cve/issues/2/comments
0
2025-01-18T11:11:56Z
2025-01-18T11:11:56Z
https://github.com/yunhai666/cve/issues/2
2,796,923,265
2
6,514
CVE-2024-50664
2025-01-23T22:15:13.667
gpac 2.4 contains a heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2988" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "42CFA40F-9987-4AB6-B61F-DAA3D8E7CB64", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2988
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Dear developers, We found the following heap buffer overflow bug on gpac(version 2.4), please confirm. The latest master branch and version 2.4 both have this bug. ### Version ```shell MP4Box - GPAC version 2.4-rev0-g5d70253ac-HEAD ``` ### ASAN Log Fuzz Trigger command 1: ./b...
heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box
https://api.github.com/repos/gpac/gpac/issues/2988/comments
0
2024-10-07T12:09:15Z
2024-10-09T11:45:53Z
https://github.com/gpac/gpac/issues/2988
2,570,257,093
2,988
6,515
CVE-2024-50665
2025-01-23T22:15:13.790
gpac 2.4 contains a SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2987" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "42CFA40F-9987-4AB6-B61F-DAA3D8E7CB64", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "476" ]
476
https://github.com/gpac/gpac/issues/2987
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Dear developers, We found the following segmentation violation bug on gpac(version 2.4), please confirm. This may be due to a Segmentation violation caused by dereferencing a null pointer, which can sometimes lead to a crash. The latest master branch and version 2.4 both have this bug. ```...
SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box
https://api.github.com/repos/gpac/gpac/issues/2987/comments
1
2024-10-07T11:17:35Z
2024-10-09T11:45:53Z
https://github.com/gpac/gpac/issues/2987
2,570,129,601
2,987
6,516
CVE-2024-55192
2025-01-23T22:15:14.333
OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openimageio:openimageio:3.1.0.0:dev:*:*:*:*:*:*", "matchCriteriaId": "7AD65390-203E-40E5-ACA9-2D0C8A0A8613", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "787" ]
787
https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550
[ "Exploit", "Third Party Advisory" ]
github.com
[ "AcademySoftwareFoundation", "OpenImageIO" ]
### Description Dear developers, We discovered a heap overflow bug in src/include/OpenImageIO/detail/farmhash.h while fuzzing iconvert and oiiotool. The latest version also has this vulnerability. ### Version ```shell # ./bin/oiiotool --version 3.1.0.0dev # ./bin/iconvert -v iconvert: Must have bo...
[BUG]heap-buffer-overflow at src/include/OpenImageIO/detail/farmhash.h in OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*) in openimageio
https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/4550/comments
1
2024-12-02T11:09:38Z
2025-01-04T00:20:24Z
https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550
2,711,531,628
4,550
6,517
CVE-2024-55193
2025-01-23T22:15:14.453
OpenImageIO v3.1.0.0dev was discovered to contain a segmentation violation via the component /OpenImageIO/string_view.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4551" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openimageio:openimageio:3.1.0.0:dev:*:*:*:*:*:*", "matchCriteriaId": "7AD65390-203E-40E5-ACA9-2D0C8A0A8613", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "476" ]
476
https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4551
[ "Exploit", "Third Party Advisory" ]
github.com
[ "AcademySoftwareFoundation", "OpenImageIO" ]
### Description Dear developers, We discovered a Segmentation-violation bug in src/include/OpenImageIO/string_view.h:262 while fuzzing iconvert. The latest version also has this vulnerability. ### Version ```shell # ./bin/oiiotool --version 3.1.0.0dev # ./bin/iconvert -v iconvert: Must have both a...
[BUG]Segmentation-violation bug at src/include/OpenImageIO/string_view.h:262 in openimageio
https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/4551/comments
2
2024-12-02T11:11:13Z
2024-12-05T22:37:11Z
https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4551
2,711,536,469
4,551
6,518
CVE-2024-55194
2025-01-23T22:15:14.560
OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openimageio:openimageio:3.1.0.0:dev:*:*:*:*:*:*", "matchCriteriaId": "7AD65390-203E-40E5-ACA9-2D0C8A0A8613", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "787" ]
787
https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552
[ "Exploit", "Third Party Advisory" ]
github.com
[ "AcademySoftwareFoundation", "OpenImageIO" ]
### Description Dear developers, We discovered a heap overflow bug in src/include/OpenImageIO/fmath.h:983 while fuzzing oiiotool. The latest version also has this vulnerability. ### Version ```shell # ./bin/oiiotool --version 3.1.0.0dev # ./bin/iconvert -v iconvert: Must have both an input and out...
[BUG]heap-buffer-overflow at src/include/OpenImageIO/fmath.h:983 in openimageio
https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/4552/comments
0
2024-12-02T11:12:32Z
2024-12-10T00:02:41Z
https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552
2,711,539,849
4,552
6,519
CVE-2024-57556
2025-01-23T22:15:15.277
Cross Site Scripting vulnerability in nbubna store v.2.14.2 and before allows a remote attacker to execute arbitrary code via the store.deep.js component
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/nbubna/store/issues/127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nbubna:store:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9CD1CC5-48E3-477E-A0DB-FE6340F1939C", "versionEndExcluding": null, "versionEndIncluding": "2.14.2", "versionStartExcluding...
[ "79" ]
79
https://github.com/nbubna/store/issues/127
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "nbubna", "store" ]
Opening this issue since no security policy is defined. ## Exploit Because at line 31, `eval` is used to get the value of the key id, it is possible for an attacker to cause XSS if the parameter of `store.get` is user-controlled. ```js store.set('someKey', 'test'); store.get('someKey.key;alert(1337)'); ``` ...
XSS by eval injection on store.deep.js
https://api.github.com/repos/nbubna/store/issues/127/comments
3
2024-12-26T17:45:59Z
2024-12-26T22:20:36Z
https://github.com/nbubna/store/issues/127
2,760,000,352
127
6,520
CVE-2025-0803
2025-01-29T02:15:27.723
A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/submit_plan_new.php. The manipulation of the argument planid leads to sql injection. The attack may be launched remotely. The exploit...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/alc9700jmo/CVE/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.293924" }, { "source": "cna@vuldb.com", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gymmanagementsystem:gym_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "01FDAF8D-109B-4410-8BBC-174097B1B64C", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/alc9700jmo/CVE/issues/8
[ "Exploit" ]
github.com
[ "alc9700jmo", "CVE" ]
# **Security Advisory: SQL Injection in Gym Management System (PHP) v1.0** **Discovered By:** alc9700 --- ## **1. Affected Product** - **Product Name**: Gym Management System in PHP with Source Code - **Version**: v1.0 - **Vulnerable File**: `/dashboard/admin/submit_plan_new.php` - **Parameter**: `planid` ...
Security Advisory: SQL Injection in Gym Management System (PHP)
https://api.github.com/repos/alc9700jmo/CVE/issues/8/comments
0
2025-01-19T10:56:29Z
2025-01-19T10:56:29Z
https://github.com/alc9700jmo/CVE/issues/8
2,797,562,104
8
6,522
CVE-2025-0846
2025-01-30T01:15:13.993
A vulnerability was found in 1000 Projects Employee Task Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/AdminLogin.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/onupset/CVE/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Per...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:employee_task_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0B00664-63AD-417B-8FF7-43F08F5162FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/onupset/CVE/issues/4
[ "Third Party Advisory" ]
github.com
[ "onupset", "CVE" ]
# 1000projects Employee Task Management System Web Project using PHP and MYSQL V1.0 /Employee_Task_Management_System/source-code/PROJECT_NEW/admin/AdminLogin.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Employee Task Management System Web Project using PHP and MYSQL ## Vendor Homepage + [homepage]( https://1000...
1000projects Employee Task Management System Web Project using PHP and MYSQL V1.0 /Employee_Task_Management_System/source-code/PROJECT_NEW/admin/AdminLogin.php SQL injection
https://api.github.com/repos/onupset/CVE/issues/4/comments
0
2025-01-20T06:53:03Z
2025-01-20T06:54:17Z
https://github.com/onupset/CVE/issues/4
2,798,349,564
4
6,523
CVE-2025-0847
2025-01-30T02:15:25.403
A vulnerability was found in 1000 Projects Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /index.php of the component Login. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/onupset/CVE/issues/5" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:employee_task_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0B00664-63AD-417B-8FF7-43F08F5162FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/onupset/CVE/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "onupset", "CVE" ]
# 1000projects Employee Task Management System Web Project using PHP and MYSQL V1.0 /Employee_Task_Management_System/source-code/PROJECT_NEW/index.php SQL injection # NAME OF AFFECTED PRODUCT(S) + Employee Task Management System Web Project using PHP and MYSQL ## Vendor Homepage + [homepage]( https://1000projects.or...
1000projects Employee Task Management System Web Project using PHP and MYSQL V1.0 /Employee_Task_Management_System/source-code/PROJECT_NEW/index.php SQL injection
https://api.github.com/repos/onupset/CVE/issues/5/comments
0
2025-01-20T07:03:45Z
2025-01-20T07:08:44Z
https://github.com/onupset/CVE/issues/5
2,798,368,864
5
6,524
CVE-2025-0872
2025-01-30T16:15:30.737
A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file /addpayment.php. The manipulation of the argument id/amount/desc/inccat leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addpayment.php POST parameter SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-proj...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 addpayment.php POST parameter SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/3/comments
0
2025-01-23T07:47:55Z
2025-01-23T08:59:52Z
https://github.com/magic2353112890/cve/issues/3
2,806,173,967
3
6,526
CVE-2025-0873
2025-01-30T17:15:18.293
A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /customeredit.php. The manipulation of the argument id/address/fullname/phonenumber/email/city/comment leads to sql injection. The attack can be launch...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeredit.php POST parameter SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-pr...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 customeredit.php POST parameter SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/5/comments
0
2025-01-23T09:15:17Z
2025-01-23T09:16:01Z
https://github.com/magic2353112890/cve/issues/5
2,806,348,566
5
6,527
CVE-2025-0874
2025-01-30T18:15:33.753
A vulnerability, which was classified as critical, has been found in code-projects Simple Plugins Car Rental Management 1.0. Affected by this issue is some unknown functionality of the file /admin/approve.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit h...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://code-projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/8" }, { "source": "cna@vuldb.com"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D80D0581-09FD-4CE1-9327-CF580DF49354", "versionEndExcluding": null, "versionEndIncluding": null, "v...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
> # code-projects Simple Car Rental System In PHP With Source Code v1.0 approve.php SQL injection > # usernameOF AFFECTED PRODUCT(S) > * Restaurant Order System In PHP With Source Code > > ## Vendor Homepage > * https://code-projects.org/simple-car-rental-system-in-php-with-source-code/ > > # AFFECTED AND/OR FIXED VE...
code-projects Simple Car Rental System In PHP With Source Code v1.0 approve.php SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/8/comments
0
2025-01-24T07:22:59Z
2025-01-24T07:24:54Z
https://github.com/magic2353112890/cve/issues/8
2,808,718,469
8
6,528
CVE-2025-0943
2025-02-01T11:15:08.457
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file deldoc.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magic2353112890/cve/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://itsourcecode.com/" }, { "source": "cna@vuldb.com",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/magic2353112890/cve/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magic2353112890", "cve" ]
# Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 Multiple php files found GET type SQL injection # NAME OF AFFECTED PRODUCT(S) + Tailoring Management System Project In PHP With Source Code ## Vendor Homepage + https://itsourcecode.com/free-projects/php-project/tailoring-management-system-...
Itsourcecode Tailoring Management System Project In PHP With Source Code v1.0 Multiple php files found GET type SQL injection
https://api.github.com/repos/magic2353112890/cve/issues/7/comments
0
2025-01-24T06:07:35Z
2025-01-24T06:09:28Z
https://github.com/magic2353112890/cve/issues/7
2,808,585,275
7
6,529
CVE-2024-57668
2025-02-06T19:15:19.643
In Code-projects Shopping Portal v1.0, the insert-product.php page has an arbitrary file upload vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://code-projects.org/shopping-portal-using-php-source-code/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/passevery/vul/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fabianros:shopping_portal:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "38C7B4D7-3017-4092-879F-32794D4B04F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "434" ]
434
https://github.com/passevery/vul/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "passevery", "vul" ]
# usernameOF AFFECTED PRODUCT(S) * SHOPPING PORTAL USING PHP WITH SOURCE CODE ## Vendor Homepage * https://code-projects.org/shopping-portal-using-php-source-code/ # AFFECTED AND/OR FIXED VERSION(S) ## submitter * GuoJialiang ## Vulnerable File * insert-product.php ## VERSION(S) * v1.0 ## Software Link * ht...
SHOPPING PORTAL USING PHP WITH SOURCE CODE has arbitrary file upload vulnerability
https://api.github.com/repos/passevery/vul/issues/1/comments
0
2024-12-30T02:42:28Z
2024-12-30T02:42:28Z
https://github.com/passevery/vul/issues/1
2,762,572,779
1
6,530
CVE-2025-1172
2025-02-11T04:15:08.800
A vulnerability, which was classified as critical, has been found in 1000 Projects Bookstore Management System 1.0. Affected by this issue is some unknown functionality of the file addtocart.php. The manipulation of the argument bcid leads to sql injection. The attack may be launched remotely. The exploit has been disc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NeoVuln/CVE/issues/1" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/NeoVuln/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NeoVuln", "CVE" ]
### Vulnerability Details: The `addtocart.php` in the Bookstore Management System from 1000 Projects is vulnerable to SQL injection. ### Vulnerability Reproduction: The `bcid` parameter is not properly filtered and is directly concatenated into the SQL query, leading to a SQL injection vulnerability. ![Image](https:/...
1000 Projects Bookstore Management System SQL Injection
https://api.github.com/repos/NeoVuln/CVE/issues/1/comments
1
2025-02-05T03:25:03Z
2025-02-11T02:23:11Z
https://github.com/NeoVuln/CVE/issues/1
2,831,769,820
1
6,531
CVE-2025-1173
2025-02-11T05:15:13.530
A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file process_users_del.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NeoVuln/CVE/issues/2" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "89" ]
89
https://github.com/NeoVuln/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NeoVuln", "CVE" ]
### Vulnerability Description: The `id` parameter is not properly filtered and is directly concatenated into the SQL query, leading to a SQL injection vulnerability. Vulnerability Reproduction: On the login page, select "Admin Login." ![Image](https://github.com/user-attachments/assets/bb837852-ef0e-4b94-9985-aec487...
Bookstore Management System process_users_del.php SQL Injection
https://api.github.com/repos/NeoVuln/CVE/issues/2/comments
0
2025-02-05T07:44:43Z
2025-02-11T02:23:00Z
https://github.com/NeoVuln/CVE/issues/2
2,832,167,592
2
6,532
CVE-2025-1174
2025-02-11T05:15:13.810
A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file process_book_add.php of the component Add Book Page. The manipulation of the argument Book Name leads to cross site scripting. The attack can be initiated re...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://1000projects.org/" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NeoVuln/CVE/issues/3" }, { "source": "cna@vuldb.com", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0449A3F-C6E8-468B-ABBC-9932801A9EEE", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "79" ]
79
https://github.com/NeoVuln/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NeoVuln", "CVE" ]
### Vulnerability Description: The **Bookstore Management System** backend **process_book_add.php** is vulnerable to **Stored XSS**. ### Vulnerability Reproduction: Log in to the admin panel using the account **admin/admin**. Go to **Book → Add Book** to add a new book. ![Image](https://github.com/user-attachments/a...
1000 Projects Bookstore Management System XSS_Stored
https://api.github.com/repos/NeoVuln/CVE/issues/3/comments
1
2025-02-05T08:39:09Z
2025-02-11T02:22:49Z
https://github.com/NeoVuln/CVE/issues/3
2,832,277,442
3
6,533
CVE-2025-25343
2025-02-12T19:15:22.003
Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wy876/cve/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "120" ]
120
https://github.com/wy876/cve/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wy876", "cve" ]
## Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand function - Firmware download website: https://www.tenda.com.cn/material/show/102661 Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the `formexeCommand` function. The `strcpy(s, src)` function cop...
Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand function
https://api.github.com/repos/wy876/cve/issues/4/comments
0
2025-01-07T10:56:25Z
2025-01-07T10:56:25Z
https://github.com/wy876/cve/issues/4
2,772,534,723
4
6,534
CVE-2025-0981
2025-02-18T10:15:10.333
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript in the description field, which captures the session cookie of authenti...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7245" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/7245
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** 🔴 **High** (CWE-287: Improper Authentication) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-0981)___ #### **Authorization Required** - Administrator #### **Description** A vulnerability exists in **ChurchCRM** that allows an attacker to hijack a user's sess...
Bug: (CVE-2025-0981) - Session Hijacking via Stored Cross-Site Scripting (XSS) in Group Editor
https://api.github.com/repos/ChurchCRM/CRM/issues/7245/comments
3
2025-02-03T10:29:17Z
2025-04-21T02:58:54Z
https://github.com/ChurchCRM/CRM/issues/7245
2,827,107,053
7,245
6,535
CVE-2025-1023
2025-02-18T10:15:10.500
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The newCountName parameter is directly concatenated into an SQL query without proper sanitization, allowing an a...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7246" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7246
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1023)___ #### **Authorization Required** - Administrator or a user with permission to list `event types` #### **Description**...
Bug: (CVE-2025-1023) - SQL Injection in newCountName Parameter via EditEventTypes.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7246/comments
5
2025-02-04T10:46:36Z
2025-04-25T02:54:23Z
https://github.com/ChurchCRM/CRM/issues/7246
2,829,779,628
7,246
6,536
CVE-2025-1024
2025-02-19T09:15:10.280
A vulnerability exists in ChurchCRM 5.13.0 that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookie...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7250" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/7250
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** 🔴 **High** (CWE-79: Improper Neutralization of Input During Web Page Generation) - ___A CVE will be assigned once the vendor reviews the issue (CVE-2025-1024)___ #### **Authorization Required:** - Administrator #### **Description:** A vulnerability exists in **ChurchCRM 5.13.0** that allows...
Bug: (CVE-2025-1024) - Session Hijacking via Reflected Cross-Site Scripting (XSS) in EditEventAttendees.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7250/comments
3
2025-02-08T04:20:22Z
2025-05-11T03:05:11Z
https://github.com/ChurchCRM/CRM/issues/7250
2,839,503,293
7,250
6,537
CVE-2025-1132
2025-02-19T09:15:10.417
A time-based blind SQL Injection vulnerability exists in the ChurchCRM 5.13.0 and prior EditEventAttendees.php within the EN_tyid parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7251" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7251
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the application team reviews the issue (CVE-2025-1132)___ #### **Authorization Required:** - Administrator or authenticated user access required to view the `EventEditor...
Bug: (CVE-2025-1132) - SQL Injection in EN_tyid Parameter via EditEventAttendees.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7251/comments
3
2025-02-08T04:22:40Z
2025-05-11T03:05:10Z
https://github.com/ChurchCRM/CRM/issues/7251
2,839,506,809
7,251
6,538
CVE-2025-1133
2025-02-19T09:15:10.550
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection vulnerability in the EditEventAttendees functionality. The EID parameter is directly concatenated into an SQL query without proper sanitization, making it susce...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7252" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7252
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1133)___ #### **Authorization Required:** - Administrator access required to view `EditEventAttendees.php`. #### **Descri...
Bug: (CVE-2025-1133) - SQL Injection in EID Parameter via EditEventAttendees.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7252/comments
3
2025-02-08T04:23:57Z
2025-05-11T03:05:09Z
https://github.com/ChurchCRM/CRM/issues/7252
2,839,508,441
7,252
6,539
CVE-2025-1134
2025-02-19T09:15:10.687
A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the DonatedItemEditor functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficie...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7253" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7253
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
**Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1134)___ #### **Authorization Required:** - Administrator access required to view `DonatedItemEditor.php`. #### **Description:...
Bug: (CVE-2025-1134) - SQL Injection in CurrentFundraiser Parameter via DonatedItemEditor.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7253/comments
0
2025-02-08T04:27:56Z
2025-03-05T14:09:20Z
https://github.com/ChurchCRM/CRM/issues/7253
2,839,513,942
7,253
6,540
CVE-2025-1135
2025-02-19T09:15:10.823
A vulnerability exists in ChurchCRM 5.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the BatchWinnerEntry functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficie...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/7254" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "552A51B0-B2AE-4A12-BF43-DDCE1D8A29D2", "versionEndExcluding": null, "versionEndIncluding": "5.13.0", "versionStartEx...
[ "89" ]
89
https://github.com/ChurchCRM/CRM/issues/7254
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### **Severity:** ⚫ **Critical** (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) - ___A CVE will be assigned once the ChurchCRM team reviews the issue (CVE-2025-1135)___ #### **Authorization Required** - Administrator access required to view `BatchWinnerEntry.php`. #### **Description...
Bug: (CVE-2025-1135) - SQL Injection in CurrentFundraiser Parameter via BatchWinnerEntry.php
https://api.github.com/repos/ChurchCRM/CRM/issues/7254/comments
0
2025-02-08T04:29:55Z
2025-03-05T14:09:20Z
https://github.com/ChurchCRM/CRM/issues/7254
2,839,516,802
7,254
6,541
CVE-2025-1465
2025-02-19T16:15:40.667
A vulnerability, which was classified as problematic, was found in lmxcms 1.41. Affected is an unknown function of the file db.inc.php of the component Maintenance. The manipulation leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PA...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NeoVuln/CVE/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.296238" }, { "source": "cna@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lmxcms:lmxcms:1.41:*:*:*:*:*:*:*", "matchCriteriaId": "8FBD77AA-E05B-4141-AF77-E5F1AAA215EE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "94" ]
94
https://github.com/NeoVuln/CVE/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NeoVuln", "CVE" ]
### Vulnerability Description: LMXCMS's `BackdbAction.class.php` contains a vulnerability that allows arbitrary file deletion. By deleting the `install_ok.txt` lock file, the system can be reset. During the process of configuring the database, an attacker can write a one-liner web shell into the database configuration ...
LMXCMS V1.41 RCE Vulnerable
https://api.github.com/repos/NeoVuln/CVE/issues/6/comments
1
2025-02-08T03:15:11Z
2025-02-08T03:18:21Z
https://github.com/NeoVuln/CVE/issues/6
2,839,439,441
6
6,542
CVE-2024-12368
2025-02-25T18:15:27.020
Improper access control in the auth_oauth module of Odoo Community 15.0 and Odoo Enterprise 15.0 allows an internal user to export the OAuth tokens of other users.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "security@odoo.com", "tags": [ "Exploit", "Third Party Advisory", "Issue Tracking" ], "url": "https://github.com/odoo/odoo/issues/193854" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:15.0:*:*:*:community:*:*:*", "matchCriteriaId": "EBD0BABD-16C5-449D-8BE7-9E948A509FA5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "284" ]
284
https://github.com/odoo/odoo/issues/193854
[ "Exploit", "Third Party Advisory", "Issue Tracking" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2024-12368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12368) **Affects**: Odoo 15.0 (Community and Enterprise Editions) **CVE ID**: [CVE-2024-12368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12368) **Component**: auth_oauth module **Credits**: Rafael Fedler, MG...
[SEC] CVE-2024-12368 - Improper access control in the auth_oauth mod...
https://api.github.com/repos/odoo/odoo/issues/193854/comments
0
2025-01-15T19:52:13Z
2025-01-15T19:52:14Z
https://github.com/odoo/odoo/issues/193854
2,790,710,310
193,854
6,543
CVE-2024-36259
2025-02-25T19:15:14.343
Improper access control in mail module of Odoo Community 17.0 and Odoo Enterprise 17.0 allows remote authenticated attackers to extract sensitive information via an oracle-based (yes/no response) crafted attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "security@odoo.com", "tags": [ "Exploit", "Third Party Advisory", "Mitigation" ], "url": "https://github.com/odoo/odoo/issues/199330" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:17.0:*:*:*:community:*:*:*", "matchCriteriaId": "1FF25CC4-AE0E-4F96-8708-83512BD0E249", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "284" ]
284
https://github.com/odoo/odoo/issues/199330
[ "Exploit", "Third Party Advisory", "Mitigation" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2024-36259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36259) **Affects**: Odoo 17.0 (Community and Enterprise Editions) **CVE ID**: [CVE-2024-36259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36259) **Component**: Mail **Credits**: Bram Van Gaal Improper access...
[SEC] CVE-2024-36259 - Improper access control in mail module of Odo...
https://api.github.com/repos/odoo/odoo/issues/199330/comments
0
2025-02-25T19:06:35Z
2025-02-25T19:06:36Z
https://github.com/odoo/odoo/issues/199330
2,879,312,217
199,330
6,544
CVE-2025-27110
2025-02-25T20:15:37.517
Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. A bug that exists only in Libmodsecurity3 version 3.0.13 means that, in 3.0.13, Libmodsecurity3 can't decode encoded...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/owasp-modsecurity/ModSecurity/issues/3340" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trustwave:modsecurity:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "B30344C2-C12E-466B-BD92-A6B0A17EDC8E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "172" ]
172
https://github.com/owasp-modsecurity/ModSecurity/issues/3340
[ "Exploit", "Issue Tracking" ]
github.com
[ "owasp-modsecurity", "ModSecurity" ]
**Describe the bug** The following string should be decoded into `{`: `&#00000000000000000000000000000000000000000000000123;` but is instead decoded into `\x0000000000000000000000000000000000000000000000123;`. **Logs and dumps** Output of debug log: ``` [173942934834.266950] [/get] [9] Target value: "localhost" (Va...
HTML entity decoding fails to decode some exotic values
https://api.github.com/repos/owasp-modsecurity/ModSecurity/issues/3340/comments
2
2025-02-13T06:57:32Z
2025-03-10T13:08:46Z
https://github.com/owasp-modsecurity/ModSecurity/issues/3340
2,850,144,963
3,340
6,545