CVE-2024-11243 – code-projects Online Shop Store signup.php cross site scripting
https://notcve.org/view.php?id=CVE-2024-11243
A vulnerability classified as problematic has been found in code-projects Online Shop Store 1.0. This affects an unknown part of the file /signup.php. The manipulation of the argument m2 with the input <svg%20onload=alert(document.cookie)> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://code-projects.org https://github.com/sh3rl0ckpggp/0day/blob/main/code-projects_online-shop_CrossSiteScripting.md https://vuldb.com/?ctiid.284679 https://vuldb.com/?id.284679 https://vuldb.com/?submit.442075 https://youtu.be/QThAqddl5Dk • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-11241 – code-projects Job Recruitment reset.php sql injection
https://notcve.org/view.php?id=CVE-2024-11241
A vulnerability was found in code-projects Job Recruitment 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file reset.php. The manipulation of the argument e leads to sql injection. The attack can be launched remotely. • https://code-projects.org https://github.com/Anti-Entropy-Zhurong/cve/blob/main/sql-1.md https://vuldb.com/?ctiid.284677 https://vuldb.com/?id.284677 https://vuldb.com/?submit.442036 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-11127 – code-projects Job Recruitment admin.php sql injection
https://notcve.org/view.php?id=CVE-2024-11127
A vulnerability was found in code-projects Job Recruitment up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin.php. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. • https://code-projects.org https://github.com/ljllll123/cve/blob/main/sql-1.md https://vuldb.com/?ctiid.283975 https://vuldb.com/?id.283975 https://vuldb.com/?submit.441841 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-11099 – code-projects Job Recruitment login.php sql injection
https://notcve.org/view.php?id=CVE-2024-11099
A vulnerability was found in code-projects Job Recruitment 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://code-projects.org https://github.com/Kenton868/CVE/blob/main/sqlInjection1.md https://vuldb.com/?ctiid.283919 https://vuldb.com/?id.283919 https://vuldb.com/?submit.441259 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-11096 – code-projects Task Manager newProject.php sql injection
https://notcve.org/view.php?id=CVE-2024-11096
A vulnerability, which was classified as critical, was found in code-projects Task Manager 1.0. This affects an unknown part of the file /newProject.php. The manipulation of the argument projectName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://code-projects.org https://github.com/UnrealdDei/cve/blob/main/sql4.md https://vuldb.com/?ctiid.283917 https://vuldb.com/?id.283917 https://vuldb.com/?submit.441186 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •