Latest Code-projects Vulnerabilities

itsourcecode Simple Task List signUp.php insertUserRecord sql injection
Code-Projects Simple Task List=1.0
code-projects Simple Ticket Booking Login adminauthenticate.php sql injection
code-projects Simple Ticket Booking=1.0
Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'id' parameter at "School/delete.php?id=5."
Code-projects Simple School Management System=1.0
Code-projects Simple School Managment System 1.0 allows Authentication Bypass via the username and password parameters at School/index.php.
Code-projects Simple School Management System=1.0
Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'id' parameter at "School/sub_delete.php?id=5."
Code-projects Simple School Management System=1.0
Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'pass' parameter at School/teacher_login.php.
Code-projects Simple School Management System=1.0
Code-projects Simple School Managment System 1.0 allows Authentication Bypass via the username and password parameters at School/teacher_login.php.
Code-projects Simple School Management System=1.0
Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'apass' parameter at "School/index.php."
Code-projects Simple School Management System=1.0
Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'aname' parameter at "School/index.php".
Code-projects Simple School Management System=1.0
Code-projects Cinema Seat Reservation System 1.0 allows SQL Injection via the 'id' parameter at "/Cinema-Reservation/booking.php?id=1."
Code-projects Cinema Seat Reservation System=1.0
Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'name' parameter at School/teacher_login.php.
Code-projects Simple School Management System=1.0
code-projects Social Networking Site Message Page message.php cross site scripting
code-projects Social Networking Site=1.0
code-projects Fighting Cock Information System edit_chicken.php sql injection
=1.0
code-projects Fighting Cock Information System new-feed.php sql injection
=1.0
code-projects Fighting Cock Information System delete-vaccine.php sql injection
=1.0
code-projects Fighting Cock Information System add_con.php sql injection
=1.0
code-projects Fighting Cock Information System add_con.php sql injection
=1.0
code-projects Fighting Cock Information System update_mother.php sql injection
=1.0
code-projects Fighting Cock Information System edit_chicken.php sql injection
=1.0
code-projects Fighting Cock Information System update-deworm.php sql injection
=1.0
code-projects Dormitory Management System modifyuser.php sql injection
code-projects Dormitory Management System=1.0
code-projects Dormitory Management System login.php sql injection
code-projects Dormitory Management System=1.0
code-projects Dormitory Management System comment.php sql injection
code-projects Dormitory Management System=1.0
code-projects Dormitory Management System modifyuser.php information disclosure
code-projects Dormitory Management System=1.0
code-projects Human Resource Integrated System dec_service_credits.php sql injection
=1.0
code-projects Human Resource Integrated System inc_service_credits.php sql injection
=1.0
code-projects Human Resource Integrated System update_personal_info.php sql injection
code-projects Human Resource Integrated System=1.0
code-projects Fighting Cock Information System new-father.php unrestricted upload
code-projects Fighting Cock Information System=1.0
code-projects Employee Profile Management System file_table.php sql injection
code-projects Employee Profile Management System=1.0
code-projects Employee Profile Management System download.php path traversal
code-projects Employee Profile Management System=1.0
code-projects Online Faculty Clearance HTTP GET Request delete_faculty.php sql injection
code-projects Online Faculty Clearance=1.0
A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php. The manipulation...
code-projects Simple Online Hotel Reservation System=1.0
code-projects QR Code Generator cross site scripting
=1.0
code-projects Client Details System regester.php cross site scripting
=1.0
code-projects Client Details System clientview.php sql injection
=1.0
code-projects Client Details System update-clients.php sql injection
=1.0
code-projects Client Details System manage-users.php sql injection
=1.0
code-projects Client Details System HTTP POST Request regester.php sql injection
=1.0
code-projects Client Details System HTTP POST Request admin sql injection
=1.0
code-projects Client Details System HTTP POST Request sql injection
=1.0
code-projects Record Management System Document Type doctype.php cross site scripting
=1.0
code-projects Record Management System Offices offices.php cross site scripting
=1.0
code-projects Voting System Voters Login sql injection
=1.0
code-projects Voting System Admin Login sql injection
=1.0
code-projects Automated Voting System Login sql injection
code-projects Automated Voting System=1.0
code-projects Automated Voting System Admin Login sql injection
=1.0
code-projects Point of Sales and Inventory Management System checkout.php cross site scripting
=1.0
SQL Injection vulnerability in add.php in Simple CRUD Functionality v1.0 allows attackers to run arbitrary SQL commands via the 'title' parameter.
Code-projects Simple Crud Functionality=1.0
Cross-Site Scripting (XSS) vulnerability in Inventory Management V1.0 allows attackers to execute arbitrary code via the pname parameter of the editProduct.php component.
Code-projects Inventory Management=1.0
SQL injection vulnerability in Inventory Management v.1.0 allows a local attacker to execute arbitrary SQL commands via the id paramter in the deleteProduct.php component.
Code-projects Inventory Management=1.0

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203