cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-10163,https://securityvulnerability.io/vulnerability/CVE-2024-10163,SQL Injection Vulnerability in SourceCodester Movie Rating System,"A significant vulnerability has been identified in the SourceCodester Sentiment Based Movie Rating System version 1.0. The flaw exists in the file /msrps/movie_details.php where improper handling of the 'id' argument allows for SQL injection attacks. This vulnerability enables attackers to manipulate SQL queries executed by the application, potentially leading to unauthorized access to the database and exposure of sensitive data. Furthermore, this exploit can be executed remotely, underscoring its seriousness. The issue has been made public, and users are encouraged to apply necessary security measures to protect their systems.",Sourcecodester,Sentiment Based Movie Rating System,9.8,CRITICAL,0.0006300000241026282,false,,false,false,true,2024-10-20T00:31:04.000Z,true,false,false,,2024-10-20T01:31:04.762Z,0 CVE-2024-8343,https://securityvulnerability.io/vulnerability/CVE-2024-8343,SQL Injection Vulnerability in SourceCodester Movie Rating System,"A significant SQL injection vulnerability has been identified in the User Registration Handler of SourceCodester's Sentiment Based Movie Rating System version 1.0. This flaw arises from improper handling of the 'email' argument within the /classes/Users.php?f=save_client endpoint. An attacker can exploit this vulnerability remotely, which may lead to unauthorized access to sensitive user data and compromise the integrity of the system. The exploit has been made public, thus increasing the urgency for system administrators to implement necessary security measures to mitigate potential risks.",SourceCodester,Sentiment Based Movie Rating System,9.8,CRITICAL,0.0010900000343099236,false,,false,false,false,,,false,false,,2024-08-30T16:15:00.000Z,0