cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-1793,https://securityvulnerability.io/vulnerability/CVE-2023-1793,SourceCodester Police Crime Record Management System GET Parameter assigncase.php sql injection,"A SQL injection vulnerability has been identified in the Police Crime Record Management System 1.0 developed by SourceCodester. This issue exists within the argument caseid in the file /officer/assigncase.php, allowing attackers to manipulate the GET parameters and potentially execute unauthorized SQL commands. The vulnerability can be exploited remotely, posing significant risks to data integrity and security. Public disclosure of this exploit raises concerns about potential misuse.",SourceCodester,Police Crime Record Management System,9.8,CRITICAL,0.002139999996870756,false,,false,false,false,,,false,false,,2023-04-02T08:15:00.000Z,0 CVE-2023-1794,https://securityvulnerability.io/vulnerability/CVE-2023-1794,SourceCodester Police Crime Record Management System GET Parameter casedetails.php cross site scripting,"A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/casedetails.php of the component GET Parameter Handler. The manipulation of the argument id with the input ""> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224746 is the identifier assigned to this vulnerability.",SourceCodester,Police Crime Record Management System,6.1,MEDIUM,0.0007999999797903001,false,,false,false,false,,,false,false,,2023-04-02T08:15:00.000Z,0