Search

Search Results (318714 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-28425 1 Janobe 1 Baby Care System 2025-11-18 9.8 Critical
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/pagerole.php&action=display&value=1&roleid=.
CVE-2022-28421 1 Janobe 1 Baby Care System 2025-11-18 9.8 Critical
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=posts&action=display&value=1&postid=.
CVE-2022-28438 1 Janobe 1 Baby Care System 2025-11-18 9.8 Critical
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=type&userrole=User&userid=.
CVE-2022-28422 1 Janobe 1 Baby Care System 2025-11-18 9.8 Critical
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&action=edit.
CVE-2022-28435 1 Janobe 1 Baby Care System 2025-11-18 9.8 Critical
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/siteoptions.php&action=displaygoal&value=1&roleid=1.
CVE-2022-28433 1 Janobe 1 Baby Care System 2025-11-18 9.8 Critical
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=display&value=Show&userid=.
CVE-2022-28424 1 Janobe 1 Baby Care System 2025-11-18 9.8 Critical
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&find=.
CVE-2022-28423 1 Janobe 1 Baby Care System 2025-11-18 9.8 Critical
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&action=delete.
CVE-2022-28420 1 Janobe 1 Baby Care System 2025-11-18 9.8 Critical
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via BabyCare/admin.php?id=theme&setid=.
CVE-2021-25780 1 Janobe 1 Baby Care System 2025-11-18 7.2 High
An arbitrary file upload vulnerability has been identified in posts.php in Baby Care System 1.0. The vulnerability could be exploited by an remote attacker to upload content to the server, including PHP files, which could result in command execution and obtaining a shell.
CVE-2025-13237 2 Itsourcecode, Janobe 2 Inventory Management System, Inventory Management System 2025-11-18 7.3 High
A security flaw has been discovered in itsourcecode Inventory Management System 1.0. Affected is an unknown function of the file /LogSignModal.PHP. The manipulation of the argument U_USERNAME results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
CVE-2025-45237 1 Dbsyncer Project 1 Dbsyncer 2025-11-18 7.5 High
Incorrect access control in the component /config/download of DBSyncer v2.0.6 allows attackers to access the JSON file containing sensitive account information, including the encrypted password.
CVE-2025-45236 1 Dbsyncer Project 1 Dbsyncer 2025-11-18 5.4 Medium
A stored cross-site scripting (XSS) vulnerability in the Edit Profile feature of DBSyncer v2.0.6 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Nickname parameter.
CVE-2025-12853 2 Mayurik, Sourcecodester 2 Best House Rental Management System, Best House Rental Management System 2025-11-18 4.7 Medium
A vulnerability was determined in SourceCodester Best House Rental Management System 1.0. This affects the function delete_house of the file /admin_class.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
CVE-2025-12873 1 Campcodes 2 School File Management, School File Management System 2025-11-18 4.7 Medium
A security flaw has been discovered in Campcodes School File Management 1.0. This affects an unknown part of the file /admin/update_user.php. Performing manipulation of the argument user_id results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.
CVE-2025-59110 2025-11-18 N/A
Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Implemented CSRF protection mechanism can be bypassed by using CSRF token of other user. It is worth noting that the registration is open and anyone can create an account. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CVE-2025-59669 1 Fortinet 1 Fortiweb 2025-11-18 4.8 Medium
A use of hard-coded credentials vulnerability in Fortinet FortiWeb 7.6.0, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow an authenticated attacker with shell access to the device to connect to redis service and access its data
CVE-2025-63713 2 Remyandrade, Sourcecodester 2 Matching Type Test, Matchmaster 2025-11-18 6.1 Medium
Cross-Site Scripting (XSS) vulnerability in SourceCodester "MatchMaster" 1.0 allows remote attackers to inject arbitrary web script or HTML via crafted input in the custom test creation feature. The vulnerability exists because the application fails to properly sanitize user-supplied input in test titles and matching pair items before rendering them in the DOM during test execution.
CVE-2025-59112 2025-11-18 N/A
Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send POST request that deletes given user. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 4.1 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CVE-2025-12870 1 Aenrich 2 A+hrd, A\+hrd 2025-11-18 9.8 Critical
The a+HRD developed by aEnrich has an Authentication Abuse vulnerability, allowing unauthenticated remote attackers to send crafted packets to obtain administrator access tokens and use them to access the system with elevated privileges.