Vulnerabilities (CVE)

Filtered by vendor Surajkumarvishwakarma Subscribe
Filtered by product Real Estate Management System
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-1103 1 Surajkumarvishwakarma 1 Real Estate Management System 2024-11-21 4.0 MEDIUM 3.5 LOW
A vulnerability was found in CodeAstro Real Estate Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file profile.php of the component Feedback Form. The manipulation of the argument Your Feedback with the input <img src=x onerror=alert(document.cookie)> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252458 is the identifier assigned to this vulnerability.
CVE-2024-11058 1 Surajkumarvishwakarma 1 Real Estate Management System 2024-11-13 5.8 MEDIUM 7.2 HIGH
A vulnerability was found in CodeAstro Real Estate Management System up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /aboutedit.php of the component About Us Page. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-11000 1 Surajkumarvishwakarma 1 Real Estate Management System 2024-11-13 5.8 MEDIUM 7.2 HIGH
A vulnerability classified as problematic was found in CodeAstro Real Estate Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /aboutedit.php of the component About Us Page. The manipulation of the argument aimage leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-10999 1 Surajkumarvishwakarma 1 Real Estate Management System 2024-11-13 5.8 MEDIUM 7.2 HIGH
A vulnerability classified as problematic has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /aboutadd.php of the component About Us Page. The manipulation of the argument aimage leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.