Page 70 of 507 results (0.010 seconds)

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /control/addcase_stage.php. The manipulation of the argument cname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md https://vuldb.com/?ctiid.260275 https://vuldb.com/?id.260275 https://vuldb.com/?submit.312813 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected is an unknown function of the file /control/activate_case.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md https://vuldb.com/?ctiid.260274 https://vuldb.com/?id.260274 https://vuldb.com/?submit.312807 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0. This issue affects some unknown processing of the file /control/deactivate_case.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md https://vuldb.com/?ctiid.260273 https://vuldb.com/?id.260273 https://vuldb.com/?submit.312804 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as problematic was found in SourceCodester Warehouse Management System 1.0. This vulnerability affects unknown code of the file pengguna.php. The manipulation of the argument admin_user/admin_nama/admin_alamat/admin_telepon leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/fubxx/CVE/blob/main/WarehouseManagementSystemXSS4.md https://vuldb.com/?ctiid.260272 https://vuldb.com/?id.260272 https://vuldb.com/?submit.312704 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as problematic has been found in SourceCodester Warehouse Management System 1.0. This affects an unknown part of the file customer.php. The manipulation of the argument nama_customer/alamat_customer/notelp_customer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/fubxx/CVE/blob/main/WarehouseManagementSystemXSS3.md https://vuldb.com/?ctiid.260271 https://vuldb.com/?id.260271 https://vuldb.com/?submit.312703 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •