10 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 10EXPL: 1

A vulnerability was found in Project Worlds Free Download Online Shopping System up to 192.168.1.88. It has been rated as critical. This issue affects some unknown processing of the file /online-shopping-webvsite-in-php-master/success.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. • https://github.com/Sy0ung-cmd/Cve-report/blob/main/SQLi-1.md https://vuldb.com/?ctiid.283805 https://vuldb.com/?id.283805 https://vuldb.com/?submit.440337 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /editNominee.php. The manipulation of the argument nominee_id leads to sql injection. The attack can be initiated remotely. • https://github.com/GKb0y/Cve-report/blob/main/SQLi-life-insurance-management-system.md https://vuldb.com/?ctiid.282904 https://vuldb.com/?id.282904 https://vuldb.com/?submit.435424 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been classified as critical. This affects an unknown part of the file /editPayment.php. The manipulation of the argument recipt_no leads to sql injection. It is possible to initiate the attack remotely. • https://github.com/peteryang520/Cve-report/blob/main/SQLi-1.md https://vuldb.com/?ctiid.282903 https://vuldb.com/?id.282903 https://vuldb.com/?submit.435410 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

A vulnerability classified as critical was found in Project Worlds Online Time Table Generator 1.0. Affected by this vulnerability is an unknown functionality of the file /timetable/staff/staffdashboard.php?info=updateprofile. The manipulation of the argument n leads to sql injection. The attack can be launched remotely. • https://github.com/jadu101/CVE/blob/main/project_worlds_online_time_table_generator_update_profile_sqli.md https://vuldb.com/?ctiid.282007 https://vuldb.com/?id.282007 https://vuldb.com/?submit.432372 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical has been found in Project Worlds Online Time Table Generator 1.0. Affected is an unknown function of the file /timetable/admin/admindashboard.php?info=add_course. The manipulation of the argument c leads to sql injection. It is possible to launch the attack remotely. • https://github.com/jadu101/CVE/blob/main/project_worlds_online_time_table_generator_add_department_sqli.md https://vuldb.com/?ctiid.282006 https://vuldb.com/?id.282006 https://vuldb.com/?submit.432371 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •