Filtered by vendor Codeastro Subscriptions
Filtered by product Real Estate Management System Subscriptions
Total 4 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-0543 1 Codeastro 1 Real Estate Management System 2024-11-21 6.3 Medium
A vulnerability classified as critical has been found in CodeAstro Real Estate Management System up to 1.0. This affects an unknown part of the file propertydetail.php. The manipulation of the argument pid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250713 was assigned to this vulnerability.
CVE-2024-11058 2 Codeastro, Surajkumarvishwakarma 2 Real Estate Management System, Real Estate Management System 2024-11-13 4.7 Medium
A vulnerability was found in CodeAstro Real Estate Management System up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /aboutedit.php of the component About Us Page. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-11000 2 Codeastro, Surajkumarvishwakarma 2 Real Estate Management System, Real Estate Management System 2024-11-13 4.7 Medium
A vulnerability classified as problematic was found in CodeAstro Real Estate Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /aboutedit.php of the component About Us Page. The manipulation of the argument aimage leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-10999 2 Codeastro, Surajkumarvishwakarma 2 Real Estate Management System, Real Estate Management System 2024-11-13 4.7 Medium
A vulnerability classified as problematic has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /aboutadd.php of the component About Us Page. The manipulation of the argument aimage leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.