Page 77 of 507 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in SourceCodester Human Resource Information System 1.0 and classified as critical. This vulnerability affects unknown code of the file initialize/login_process.php. The manipulation of the argument hr_email/hr_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/thisissuperann/Vul/blob/Human-Resource-Information-System/Human-Resource-Information-System-01.md https://vuldb.com/?ctiid.259582 https://vuldb.com/?id.259582 https://vuldb.com/?submit.311431 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

A vulnerability classified as problematic was found in SourceCodester Computer Laboratory Management System 1.0. This vulnerability affects unknown code of the file /classes/SystemSettings.php?f=update_settings. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. • https://github.com/Neo-XeD/CVE-2024-33775 https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md https://vuldb.com/?ctiid.259498 https://vuldb.com/?id.259498 https://vuldb.com/?submit.311155 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical has been found in SourceCodester Computer Laboratory Management System 1.0. This affects an unknown part of the file config.php. The manipulation of the argument url leads to execution after redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md https://vuldb.com/?ctiid.259497 https://vuldb.com/?id.259497 https://vuldb.com/?submit.311154 • CWE-698: Execution After Redirect (EAR) •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Online Library System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file admin/users/controller.php. The manipulation of the argument user_name leads to cross site scripting. The attack may be initiated remotely. • https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-07.md https://vuldb.com/?ctiid.259469 https://vuldb.com/?id.259469 https://vuldb.com/?submit.310432 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Online Library System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file admin/books/index.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. • https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-06.md https://vuldb.com/?ctiid.259468 https://vuldb.com/?id.259468 https://vuldb.com/?submit.310431 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •