CVE-2024-3621 – SourceCodester Kortex Lite Advocate Office Management System register_case.php sql injection
https://notcve.org/view.php?id=CVE-2024-3621
A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been classified as critical. This affects an unknown part of the file /control/register_case.php. The manipulation of the argument title/case_no/client_name/court/case_type/case_stage/legel_acts/description/filling_date/hearing_date/opposite_lawyer/total_fees/unpaid leads to sql injection. It is possible to initiate the attack remotely. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md https://vuldb.com/?ctiid.260277 https://vuldb.com/?id.260277 https://vuldb.com/?submit.312832 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3620 – SourceCodester Kortex Lite Advocate Office Management System adds.php sql injection
https://notcve.org/view.php?id=CVE-2024-3620
A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /control/adds.php. The manipulation of the argument name/gender/dob/email/mobile/address leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md https://vuldb.com/?ctiid.260276 https://vuldb.com/?id.260276 https://vuldb.com/?submit.312815 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3619 – SourceCodester Kortex Lite Advocate Office Management System addcase_stage.php sql injection
https://notcve.org/view.php?id=CVE-2024-3619
A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /control/addcase_stage.php. The manipulation of the argument cname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md https://vuldb.com/?ctiid.260275 https://vuldb.com/?id.260275 https://vuldb.com/?submit.312813 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3618 – SourceCodester Kortex Lite Advocate Office Management System activate_case.php sql injection
https://notcve.org/view.php?id=CVE-2024-3618
A vulnerability, which was classified as critical, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected is an unknown function of the file /control/activate_case.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md https://vuldb.com/?ctiid.260274 https://vuldb.com/?id.260274 https://vuldb.com/?submit.312807 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3617 – SourceCodester Kortex Lite Advocate Office Management System deactivate_case.php sql injection
https://notcve.org/view.php?id=CVE-2024-3617
A vulnerability, which was classified as critical, has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This issue affects some unknown processing of the file /control/deactivate_case.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md https://vuldb.com/?ctiid.260273 https://vuldb.com/?id.260273 https://vuldb.com/?submit.312804 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •