Security
Headlines
HeadlinesLatestCVEs

Tag

#php

CVE-2022-40098: Bug_report/SQLi-2.md at main · WYB-signal/Bug_report

Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_expense.php.

CVE
#sql#vulnerability#windows#php#auth#firefox
CVE-2022-30003: Online Market Place Site in PHP/OOP Free Source Code

Sourcecodester Online Market Place Site 1.0 is vulnerable to Cross Site Scripting (XSS), allowing attackers to register as a Seller then create new products containing XSS payloads in the 'Product Title' and 'Short Description' fields.

Online Diagnostic Lab Management System 1.0 SQL Injection / Shell Upload

Online Diagnostic Lab Management System version 1.0 remote exploit that bypasses login with SQL injection and then uploads a shell.

Gentoo Linux Security Advisory 202209-09

Gentoo Linux Security Advisory 202209-9 - Multiple vulnerabilities have been found in Smarty, the worst of which could result in remote code execution. Versions less than 4.2.1 are affected.

CVE-2022-40483: Bug_report/SQLi-1.md at main · Geoduck-CNN/Bug_report

Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /wedding_details.php.

CVE-2022-40485: Bug_report/SQLi-3.md at main · Geoduck-CNN/Bug_report

Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /package_detail.php.

CVE-2022-40484: Bug_report/SQLi-2.md at main · Geoduck-CNN/Bug_report

Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the booking parameter at /admin/client_edit.php.

CVE-2022-40404: Bug_report/SQLi-2.md at main · wshark00/Bug_report

Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/select.php.

CVE-2022-40402: Bug_report/SQLi-1.md at main · wshark00/Bug_report

Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the booking parameter at /admin/client_assign.php.