CVE-2024-10990 – SourceCodester Online Veterinary Appointment System view_service.php sql injection
https://notcve.org/view.php?id=CVE-2024-10990
A vulnerability classified as critical was found in SourceCodester Online Veterinary Appointment System 1.0. This vulnerability affects unknown code of the file /admin/services/view_service.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/AspirePig/Cve_report/blob/main/online-veterinary-appointment-system/SQLi-1.md https://vuldb.com/?ctiid.283456 https://vuldb.com/?id.283456 https://vuldb.com/?submit.437383 https://www.sourcecodester.com • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-10559 – SourceCodester Airport Booking Management System Passport Number details buffer overflow
https://notcve.org/view.php?id=CVE-2024-10559
A vulnerability was found in SourceCodester Airport Booking Management System 1.0 and classified as critical. Affected by this issue is the function details of the component Passport Number Handler. The manipulation leads to buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. • https://github.com/CveSecLook/cve/issues/64 https://vuldb.com/?ctiid.282560 https://vuldb.com/?id.282560 https://vuldb.com/?submit.433262 https://www.sourcecodester.com • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2024-10450 – SourceCodester Kortex Lite Advocate Office Management System POST Parameter edit_profile.php sql injection
https://notcve.org/view.php?id=CVE-2024-10450
A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /kortex_lite/control/edit_profile.php of the component POST Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/Advocate-office-management-system.md https://vuldb.com/?ctiid.282010 https://vuldb.com/?id.282010 https://vuldb.com/?submit.432614 https://www.sourcecodester.com • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-10422 – SourceCodester Attendance and Payroll System overtime_add.php sql injection
https://notcve.org/view.php?id=CVE-2024-10422
A vulnerability, which was classified as critical, has been found in SourceCodester Attendance and Payroll System 1.0. This issue affects some unknown processing of the file /admin/overtime_add.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/K1nako0/tmp_vuln14/blob/main/README.md https://vuldb.com/?ctiid.281963 https://vuldb.com/?id.281963 https://vuldb.com/?submit.431980 https://www.sourcecodester.com • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-10421 – SourceCodester Attendance and Payroll System overtime_row.php sql injection
https://notcve.org/view.php?id=CVE-2024-10421
A vulnerability classified as critical was found in SourceCodester Attendance and Payroll System 1.0. This vulnerability affects unknown code of the file /admin/overtime_row.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/K1nako0/tmp_vuln13/blob/main/README.md https://vuldb.com/?ctiid.281962 https://vuldb.com/?id.281962 https://vuldb.com/?submit.431979 https://www.sourcecodester.com • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •