CVE-2024-11078 – code-projects Job Recruitment register.php cross site scripting
https://notcve.org/view.php?id=CVE-2024-11078
A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument e leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://code-projects.org https://github.com/UnrealdDei/cve/blob/main/xss.md https://vuldb.com/?ctiid.283873 https://vuldb.com/?id.283873 https://vuldb.com/?submit.441187 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-11077 – code-projects Job Recruitment index.php sql injection
https://notcve.org/view.php?id=CVE-2024-11077
A vulnerability, which was classified as critical, was found in code-projects Job Recruitment 1.0. Affected is an unknown function of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://code-projects.org https://github.com/UnrealdDei/cve/blob/main/sql3.md https://vuldb.com/?ctiid.283872 https://vuldb.com/?id.283872 https://vuldb.com/?submit.441184 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-11076 – code-projects Job Recruitment activation.php sql injection
https://notcve.org/view.php?id=CVE-2024-11076
A vulnerability, which was classified as critical, has been found in code-projects Job Recruitment 1.0. This issue affects some unknown processing of the file /activation.php. The manipulation of the argument e_hash leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://code-projects.org https://github.com/UnrealdDei/cve/blob/main/sql2-rce.md https://vuldb.com/?ctiid.283871 https://vuldb.com/?id.283871 https://vuldb.com/?submit.441182 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-10989 – code-projects E-Health Care System detail.php sql injection
https://notcve.org/view.php?id=CVE-2024-10989
A vulnerability classified as critical has been found in code-projects E-Health Care System 1.0. This affects an unknown part of the file /Admin/detail.php. The manipulation of the argument s_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://code-projects.org https://github.com/miaoyum/cve/blob/main/sql21.md https://vuldb.com/?ctiid.283455 https://vuldb.com/?id.283455 https://vuldb.com/?submit.438421 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-10988 – code-projects E-Health Care System doctor_login.php sql injection
https://notcve.org/view.php?id=CVE-2024-10988
A vulnerability was found in code-projects E-Health Care System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Doctor/doctor_login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. • https://code-projects.org https://github.com/20241018/cve/blob/main/sql.md https://vuldb.com/?ctiid.283454 https://vuldb.com/?id.283454 https://vuldb.com/?submit.438286 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •