17 results (0.011 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as critical. This affects an unknown part of the file /simple-online-bidding-system/bidding/index.php. The manipulation of the argument page leads to file inclusion. It is possible to initiate the attack remotely. • https://vuldb.com/?id.275037 https://vuldb.com/?ctiid.275037 https://vuldb.com/?submit.391657 https://github.com/Wsstiger/cve/blob/main/simple_include.md • CWE-73: External Control of File Name or Path •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical has been found in SourceCodester Simple Online Bidding System 1.0. This affects an unknown part of the file /simple-online-bidding-system/bidding/admin/ajax.php?action=delete_product. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. • https://github.com/Wsstiger/cve/blob/main/Sourcecoster_sql3.md https://vuldb.com/?ctiid.274653 https://vuldb.com/?id.274653 https://vuldb.com/?submit.390773 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /simple-online-bidding-system/bidding/admin/users.php. The manipulation leads to improper authorization. The attack may be launched remotely. • https://github.com/Wsstiger/cve/blob/main/Sourcecoster_unauthorized.md https://vuldb.com/?ctiid.274652 https://vuldb.com/?id.274652 https://vuldb.com/?submit.390302 • CWE-285: Improper Authorization •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /simple-online-bidding-system/bidding/admin/ajax.php?action=login2. The manipulation of the argument username leads to sql injection. • https://github.com/Wsstiger/cve/blob/main/Sourcecoster_sql2.md https://vuldb.com/?ctiid.274651 https://vuldb.com/?id.274651 https://vuldb.com/?submit.390297 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as critical. Affected is an unknown function of the file /simple-online-bidding-system/bidding/admin/ajax.php?action=login. The manipulation of the argument username leads to sql injection. • https://github.com/Wsstiger/cve/blob/main/Sourcecoster_sql.md https://vuldb.com/?ctiid.274650 https://vuldb.com/?id.274650 https://vuldb.com/?submit.390290 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •