Filtered by vendor Angeljudesuarez Subscriptions
Filtered by product Farm Management System Subscriptions
Total 4 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-6453 1 Angeljudesuarez 1 Farm Management System 2024-11-21 6.3 Medium
A vulnerability was found in itsourcecode Farm Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /quarantine.php?id=3. The manipulation of the argument pigno/breed/reason leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-270241 was assigned to this vulnerability. NOTE: Original submission mentioned parameter pigno only but the VulDB data analysis team determined two additional parameters to be affected as well.
CVE-2024-6190 1 Angeljudesuarez 1 Farm Management System 2024-11-21 7.3 High
A vulnerability was found in itsourcecode Farm Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-269162 is the identifier assigned to this vulnerability.
CVE-2024-10738 2 Angeljudesuarez, Itsourcecode 2 Farm Management System, Farm Management System 2024-11-05 6.3 Medium
A vulnerability classified as critical was found in itsourcecode Farm Management System 1.0. Affected by this vulnerability is an unknown functionality of the file manage-breed.php. The manipulation of the argument breed leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-10759 2 Angeljudesuarez, Itsourcecode 2 Farm Management System, Farm Management System 2024-11-05 6.3 Medium
A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /edit-pig.php. The manipulation of the argument pigno/weight/arrived/breed/remark/status leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "pigno" to be affected. But it must be assumed that other parameters are affected as well.