Page 85 of 510 results (0.007 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in SourceCodester PHP Task Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file task-details.php. The manipulation of the argument task_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/E1CHO/cve_hub/blob/main/php%20task%20management%20system/php%20task%20management%20system%20-%20vuln%203.pdf https://vuldb.com/?ctiid.259069 https://vuldb.com/?id.259069 https://vuldb.com/?submit.308631 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

A vulnerability, which was classified as critical, was found in SourceCodester PHP Task Management System 1.0. Affected is an unknown function of the file admin-manage-user.php. The manipulation of the argument admin_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/FuBoLuSec/CVE-2024-32238 https://github.com/SLthendieck/cve-report/blob/main/3.pdf https://vuldb.com/?ctiid.259068 https://vuldb.com/?id.259068 https://vuldb.com/?submit.308628 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, has been found in SourceCodester PHP Task Management System 1.0. This issue affects some unknown processing of the file admin-password-change.php. The manipulation of the argument admin_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/SLthendieck/cve-report/blob/main/2.pdf https://vuldb.com/?ctiid.259067 https://vuldb.com/?id.259067 https://vuldb.com/?submit.308627 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical was found in SourceCodester PHP Task Management System 1.0. This vulnerability affects unknown code of the file attendance-info.php. The manipulation of the argument user_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/SLthendieck/cve-report/blob/main/1.pdf https://vuldb.com/?ctiid.259066 https://vuldb.com/?id.259066 https://vuldb.com/?submit.308626 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as problematic, was found in SourceCodester Computer Laboratory Management System 1.0. This affects an unknown part of the file /classes/Users.php?f=save. The manipulation of the argument middlename leads to cross site scripting. It is possible to initiate the attack remotely. • https://github.com/Sospiro014/zday1/blob/main/xss_1.md https://vuldb.com/?ctiid.258915 https://vuldb.com/?id.258915 https://vuldb.com/?submit.308214 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •