Filtered by vendor Projectworlds
Subscriptions
Total
104 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-36598 | 1 Projectworlds | 1 Life Insurance Management System | 2024-11-21 | 8.1 High |
An arbitrary file upload vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary code via uploading a crafted image file. | ||||
CVE-2024-36597 | 1 Projectworlds | 1 Life Insurance Management System | 2024-11-21 | 8.8 High |
Aegon Life v1.0 was discovered to contain a SQL injection vulnerability via the client_id parameter at clientStatus.php. | ||||
CVE-2024-22922 | 1 Projectworlds | 1 Visitor Management System In Php | 2024-11-21 | 9.8 Critical |
An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php | ||||
CVE-2024-0730 | 1 Projectworlds | 1 Online Time Table Generator | 2024-11-21 | 6.3 Medium |
A vulnerability, which was classified as critical, was found in Project Worlds Online Time Table Generator 1.0. This affects an unknown part of the file course_ajax.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251553 was assigned to this vulnerability. | ||||
CVE-2024-0726 | 1 Projectworlds | 1 Student Project Allocation System | 2024-11-21 | 4.3 Medium |
A vulnerability was found in Project Worlds Student Project Allocation System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file admin_login.php of the component Admin Login Module. The manipulation of the argument msg with the input test%22%3Cscript%3Ealert(%27Torada%27)%3C/script%3E leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251549 was assigned to this vulnerability. | ||||
CVE-2024-0262 | 1 Projectworlds | 1 Online Job Portal | 2024-11-21 | 2.4 Low |
A vulnerability was found in Online Job Portal 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /Admin/News.php of the component Create News Page. The manipulation of the argument News with the input </title><scRipt>alert(0x00C57D)</scRipt> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249818 is the identifier assigned to this vulnerability. | ||||
CVE-2023-5185 | 1 Projectworlds | 1 Gym Management System Project | 2024-11-21 | 9.1 Critical |
Gym Management System Project v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'file' parameter of profile/i.php page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application. | ||||
CVE-2023-5053 | 1 Projectworlds | 1 Hospital Management System In Php | 2024-11-21 | 9.8 Critical |
Hospital management system version 378c157 allows to bypass authentication. This is possible because the application is vulnerable to SQLI. | ||||
CVE-2023-5004 | 1 Projectworlds | 1 Hospital Management System In Php | 2024-11-21 | 9.8 Critical |
Hospital management system version 378c157 allows to bypass authentication. This is possible because the application is vulnerable to SQLI. | ||||
CVE-2023-48716 | 1 Projectworlds | 1 Student Result Management System | 2024-11-21 | 9.8 Critical |
Student Result Management System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'class_id' parameter of the add_classes.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-48689 | 1 Projectworlds | 1 Railway Reservation System | 2024-11-21 | 9.8 Critical |
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'byname' parameter of the train.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-48687 | 1 Projectworlds | 1 Railway Reservation System | 2024-11-21 | 9.8 Critical |
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'from' parameter of the reservation.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-48685 | 1 Projectworlds | 1 Railway Reservation System | 2024-11-21 | 9.8 Critical |
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'psd' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-48434 | 1 Projectworlds | 1 Online Voting System Project | 2024-11-21 | 9.8 Critical |
Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the reg_action.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-48433 | 1 Projectworlds | 1 Online Voting System Project | 2024-11-21 | 9.8 Critical |
Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the login_action.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-46800 | 1 Projectworlds | 1 Online Matrimonial Project | 2024-11-21 | 9.8 Critical |
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the view_profile.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-46793 | 1 Projectworlds | 1 Online Matrimonial Project | 2024-11-21 | 9.8 Critical |
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'day' parameter in the 'register()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-46789 | 1 Projectworlds | 1 Online Matrimonial Project | 2024-11-21 | 9.8 Critical |
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'filename' attribute of the 'pic1' multipart parameter of the functions.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-46788 | 1 Projectworlds | 1 Online Matrimonial Project | 2024-11-21 | 9.8 Critical |
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter in the 'uploadphoto()' function of the functions.php resource does not validate the characters received and they are sent unfiltered to the database. | ||||
CVE-2023-46787 | 1 Projectworlds | 1 Online Matrimonial Project | 2024-11-21 | 9.8 Critical |
Online Matrimonial Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the auth/auth.php resource does not validate the characters received and they are sent unfiltered to the database. |