Show filters
23 Total Results
Displaying 11-20 of 23
Sort by:
Attacker Value
Unknown
CVE-2022-36637
Disclosure Date: September 02, 2022 (last updated February 24, 2025)
Garage Management System v1.0 was discovered to contain a persistent cross-site scripting (XSS) vulnerability via the brand_name parameter at /brand.php.
0
Attacker Value
Unknown
CVE-2022-36636
Disclosure Date: September 02, 2022 (last updated February 24, 2025)
Garage Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /print.php.
0
Attacker Value
Unknown
CVE-2022-36582
Disclosure Date: August 31, 2022 (last updated February 24, 2025)
An arbitrary file upload vulnerability in the component /php_action/createProduct.php of Garage Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
0
Attacker Value
Unknown
CVE-2022-37184
Disclosure Date: August 31, 2022 (last updated February 24, 2025)
The application manage_website.php on Garage Management System 1.0 is vulnerable to Shell File Upload. The already authenticated malicious user, can upload a dangerous RCE or LCE exploit file.
0
Attacker Value
Unknown
CVE-2022-2672
Disclosure Date: August 05, 2022 (last updated February 24, 2025)
A vulnerability was found in SourceCodester Garage Management System. It has been classified as critical. Affected is an unknown function of the file createUser.php. The manipulation of the argument userName/uemail leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205656.
0
Attacker Value
Unknown
CVE-2022-2671
Disclosure Date: August 05, 2022 (last updated February 24, 2025)
A vulnerability was found in SourceCodester Garage Management System and classified as critical. This issue affects some unknown processing of the file removeUser.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205655.
0
Attacker Value
Unknown
CVE-2022-2645
Disclosure Date: August 04, 2022 (last updated February 24, 2025)
A vulnerability has been found in SourceCodester Garage Management System and classified as problematic. Affected by this vulnerability is an unknown functionality of the file edituser.php. The manipulation of the argument id with the input 1\"><ScRiPt>alert(1)</sCrIpT> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205573 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2022-2579
Disclosure Date: July 29, 2022 (last updated February 24, 2025)
A vulnerability, which was classified as problematic, was found in SourceCodester Garage Management System 1.0. Affected is an unknown function of the file /php_action/createUser.php. The manipulation of the argument userName with the input lala<img src="" onerror=alert(1)> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2022-2578
Disclosure Date: July 29, 2022 (last updated February 24, 2025)
A vulnerability, which was classified as critical, has been found in SourceCodester Garage Management System 1.0. This issue affects some unknown processing of the file /php_action/createUser.php. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2022-2577
Disclosure Date: July 29, 2022 (last updated February 24, 2025)
A vulnerability classified as critical was found in SourceCodester Garage Management System 1.0. This vulnerability affects unknown code of the file /edituser.php. The manipulation of the argument id with the input -2'%20UNION%20select%2011,user(),333,444--+ leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
0