CVE-2024-4093 – SourceCodester Simple Subscription Website view_application.php sql injection
https://notcve.org/view.php?id=CVE-2024-4093
A vulnerability, which was classified as critical, was found in SourceCodester Simple Subscription Website 1.0. Affected is an unknown function of the file view_application.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/4wchen/Cve/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20view_application.php%20has%20Sqlinjection.pdf https://vuldb.com/?ctiid.261822 https://vuldb.com/?id.261822 https://vuldb.com/?submit.321505 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3042 – SourceCodester Simple Subscription Website manage_user.php sql injection
https://notcve.org/view.php?id=CVE-2024-3042
A vulnerability was found in SourceCodester Simple Subscription Website 1.0 and classified as critical. This issue affects some unknown processing of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/maxmvp666/planCve/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20manage_user.php%20has%20Sqlinjection.pdf https://vuldb.com/?ctiid.258431 https://vuldb.com/?id.258431 https://vuldb.com/?submit.306119 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3015 – SourceCodester Simple Subscription Website manage_plan.php sql injection
https://notcve.org/view.php?id=CVE-2024-3015
A vulnerability classified as critical was found in SourceCodester Simple Subscription Website 1.0. Affected by this vulnerability is an unknown functionality of the file manage_plan.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Viciglu/cvehub/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20manage_plan.php%20has%20Sqlinjection.pdf https://vuldb.com/?ctiid.258301 https://vuldb.com/?id.258301 https://vuldb.com/?submit.305649 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-3014 – SourceCodester Simple Subscription Website Actions.php sql injection
https://notcve.org/view.php?id=CVE-2024-3014
A vulnerability classified as critical has been found in SourceCodester Simple Subscription Website 1.0. Affected is an unknown function of the file Actions.php. The manipulation of the argument title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Viciglu/cvehub/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20Actions.php%20has%20Sqlinjection.pdf https://vuldb.com/?ctiid.258300 https://vuldb.com/?id.258300 https://vuldb.com/?submit.305648 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-26283
https://notcve.org/view.php?id=CVE-2022-26283
Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the view_plan endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests. Se ha detectado que Simple Subscription Website versión v1.0, contiene una vulnerabilidad de inyección SQL por medio del parámetro id en el endpoint final view_plan. Esta vulnerabilidad permite a atacantes volcar la base de datos de la aplicación por medio de peticiones HTTP diseñadas • https://github.com/Dir0x/Multiple-SQLi-in-Simple-Subscription-Company/blob/main/view_plan_sqli.py • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •