Page 2 of 9 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Lot Reservation Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=login. The manipulation of the argument username leads to sql injection. • https://gist.github.com/topsky979/8eb5a3711f4802b2b05ae3702addb61e https://vuldb.com/?ctiid.273148 https://vuldb.com/?id.273148 https://vuldb.com/?submit.381195 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Lot Reservation Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /lot_details.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/topsky979/76bc2c8ce4871ad8bb60c52e47c4fb5b https://vuldb.com/?ctiid.272804 https://vuldb.com/?id.272804 https://vuldb.com/?submit.380471 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in SourceCodester Lot Reservation Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /view_model.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/topsky979/4c28743586769e73fe37007ed92cc1a7 https://vuldb.com/?ctiid.272803 https://vuldb.com/?id.272803 https://vuldb.com/?submit.380470 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, was found in SourceCodester Lot Reservation Management System 1.0. Affected is an unknown function of the file /home.php. The manipulation of the argument type leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?id.272802 https://vuldb.com/?ctiid.272802 https://vuldb.com/?submit.380469 https://gist.github.com/topsky979/9f3d490a2bfdb5794dffc2f4aed72250 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •