CVE-2024-0650 – Project Worlds Visitor Management System URL dataset.php cross site scripting
https://notcve.org/view.php?id=CVE-2024-0650
A vulnerability was found in Project Worlds Visitor Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file dataset.php of the component URL Handler. The manipulation of the argument name with the input "><script>alert('torada')</script> leads to cross site scripting. It is possible to launch the attack remotely. • https://torada.notion.site/XSS-at-datatest-php-660aabd1437d4df7a492d19a461a1f3c?pvs=4 https://vuldb.com/?ctiid.251376 https://vuldb.com/?id.251376 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-5918 – SourceCodester Visitor Management System manage_user.php sql injection
https://notcve.org/view.php?id=CVE-2023-5918
A vulnerability, which was classified as critical, was found in SourceCodester Visitor Management System 1.0. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-244308. • https://github.com/Castle1984/CveRecord/blob/main/Sql_apply.md https://vuldb.com/?ctiid.244308 https://vuldb.com/?id.244308 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-38265
https://notcve.org/view.php?id=CVE-2022-38265
Apartment Visitor Management System v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter at /avms/edit-apartment.php. Se ha detectado que Apartment Visitor Management System versión v1.0, contiene una vulnerabilidad de inyección SQL por medio del parámetro editid en el archivo /avms/edit-apartment.php • https://github.com/xxxcoll/bug_report/blob/main/vendors/oretnom23/apartment-visitor-management-system/SQLi-1.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •