15 results (0.023 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file book.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be launched remotely. • https://github.com/LiuYongXiang-git/cve/issues/3 https://vuldb.com/?ctiid.268460 https://vuldb.com/?id.268460 https://vuldb.com/?submit.356177 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bookPerPub.php. The manipulation of the argument pubid leads to sql injection. The attack can be launched remotely. • https://github.com/LiuYongXiang-git/cve/issues/2 https://vuldb.com/?ctiid.268459 https://vuldb.com/?id.268459 https://vuldb.com/?submit.356164 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

The 'bookisbn' parameter of the cart.php resource does not validate the characters received and they are sent unfiltered to the database. El parámetro 'bookisbn' del recurso cart.php no valida los caracteres recibidos y se envían sin filtrar a la base de datos. • https://fluidattacks.com/advisories/filth https://projectworlds.in • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Online Book Store Project v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'image' parameter of admin_edit.php page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application. Online Book Store Project v1.0 es vulnerable a una vulnerabilidad de carga de archivos insegura en el parámetro 'image' de la página admin_edit.php, lo que permite a un atacante autenticado obtener la ejecución remota de código en el servidor que aloja la aplicación. • https://fluidattacks.com/advisories/shagrath https://projectworlds.in • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Online Book Store Project v1.0 is vulnerable to SQL Injection via /bookstore/bookPerPub.php. • https://github.com/iknownt/bug_report/blob/main/vendors/itsourcecode.com/Online-Book-Store-Project/sql_injection.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •