CVE-2024-3695 – SourceCodester Computer Laboratory Management System Users.php cross site scripting
https://notcve.org/view.php?id=CVE-2024-3695
A vulnerability has been found in SourceCodester Computer Laboratory Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/E1CHO/cve_hub/blob/main/Computer%20Laboratory%20Management%20System%20using%20PHP%20and%20MySQL%20-%20vuln%202.pdf https://vuldb.com/?ctiid.260482 https://vuldb.com/?id.260482 https://vuldb.com/?submit.314071 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-3621 – SourceCodester Kortex Lite Advocate Office Management System register_case.php sql injection
https://notcve.org/view.php?id=CVE-2024-3621
A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been classified as critical. This affects an unknown part of the file /control/register_case.php. The manipulation of the argument title/case_no/client_name/court/case_type/case_stage/legel_acts/description/filling_date/hearing_date/opposite_lawyer/total_fees/unpaid leads to sql injection. It is possible to initiate the attack remotely. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md https://vuldb.com/?ctiid.260277 https://vuldb.com/?id.260277 https://vuldb.com/?submit.312832 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3620 – SourceCodester Kortex Lite Advocate Office Management System adds.php sql injection
https://notcve.org/view.php?id=CVE-2024-3620
A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /control/adds.php. The manipulation of the argument name/gender/dob/email/mobile/address leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md https://vuldb.com/?ctiid.260276 https://vuldb.com/?id.260276 https://vuldb.com/?submit.312815 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3619 – SourceCodester Kortex Lite Advocate Office Management System addcase_stage.php sql injection
https://notcve.org/view.php?id=CVE-2024-3619
A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /control/addcase_stage.php. The manipulation of the argument cname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md https://vuldb.com/?ctiid.260275 https://vuldb.com/?id.260275 https://vuldb.com/?submit.312813 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3618 – SourceCodester Kortex Lite Advocate Office Management System activate_case.php sql injection
https://notcve.org/view.php?id=CVE-2024-3618
A vulnerability, which was classified as critical, was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected is an unknown function of the file /control/activate_case.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md https://vuldb.com/?ctiid.260274 https://vuldb.com/?id.260274 https://vuldb.com/?submit.312807 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •