Search Results (312442 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-28423 1 Phpgurukul 1 Teachers Record Management System 2025-05-28 8.8 High
Multiple SQL Injection vulnerabilities in Teachers Record Management System 1.0 thru 2.1 allow remote authenticated users to execute arbitrary SQL commands via the 'editid' GET parameter in edit-subjects-detail.php, edit-teacher-detail.php, or the 'searchdata' POST parameter in search.php.
CVE-2023-51756 2025-05-28 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2023-51753 2025-05-28 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2023-50338 2025-05-28 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2023-49904 2025-05-28 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2023-49604 2025-05-28 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2023-49139 2025-05-28 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2023-49137 2025-05-28 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2023-48726 2025-05-28 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2023-29857 1 Teslamate 1 Teslamate 2025-05-28 5.3 Medium
An issue in Teslamate v1.27.1 allows attackers to obtain sensitive information via directly accessing the teslamate link.
CVE-2022-23126 1 Teslamate 1 Teslamate 2025-05-28 9.8 Critical
TeslaMate before 1.25.1 (when using the default Docker configuration) allows attackers to open doors of Tesla vehicles, start Keyless Driving, and interfere with vehicle operation en route. This occurs because an attacker can leverage Grafana login access to obtain a token for Tesla API calls.
CVE-2022-44581 1 Wpmudev 1 Defender 2025-05-28 5 Medium
Insecure Storage of Sensitive Information vulnerability in WPMU DEV Defender Security allows : Screen Temporary Files for Sensitive Information.This issue affects Defender Security: from n/a through 3.3.2.
CVE-2024-37444 1 Wpmudev 2 Defender, Defender Security 2025-05-28 5.3 Medium
Missing Authorization vulnerability in WPMU DEV Defender Security allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Defender Security: from n/a through 4.7.1.
CVE-2024-25595 1 Wpmudev 1 Defender 2025-05-28 5.3 Medium
Authentication Bypass by Spoofing vulnerability in WPMU DEV Defender Security allows Functionality Bypass.This issue affects Defender Security: from n/a through 4.4.1.
CVE-2025-47851 1 Jetbrains 1 Teamcity 2025-05-28 4.8 Medium
In JetBrains TeamCity before 2025.03.2 stored XSS via GitHub Checks Webhook was possible
CVE-2025-47852 1 Jetbrains 1 Teamcity 2025-05-28 4.8 Medium
In JetBrains TeamCity before 2025.03.2 stored XSS via YouTrack integration was possible
CVE-2025-47853 1 Jetbrains 1 Teamcity 2025-05-28 4.8 Medium
In JetBrains TeamCity before 2025.03.2 stored XSS via Jira integration was possible
CVE-2025-47854 1 Jetbrains 1 Teamcity 2025-05-28 4.3 Medium
In JetBrains TeamCity before 2025.03.2 open redirect was possible on editing VCS Root page
CVE-2025-3243 1 Code-projects 1 Patient Record Management System 2025-05-28 6.3 Medium
A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dental_form.php. The manipulation of the argument itr_no/dental_no leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-3304 1 Code-projects 1 Patient Record Management System 2025-05-28 6.3 Medium
A vulnerability, which was classified as critical, was found in code-projects Patient Record Management System 1.0. This affects an unknown part of the file /dental_not.php. The manipulation of the argument itr_no leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.