A vulnerability was found in CodeAstro Expense Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2025-6478. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in SourceCodester Student Result Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /script/admin/system of the component System Settings Page. The manipulation of the argument School Name leads to cross site scripting.
This vulnerability is known as CVE-2025-6477. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Gym Management System 1.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-6476. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Student Result Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /script/admin/manage_students of the component Manage Students Module. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-6475. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in code-projects Inventory Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /changeUsername.php. The manipulation of the argument user_id leads to sql injection.
This vulnerability was named CVE-2025-6474. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in code-projects School Fees Payment System 1.0. This affects an unknown part of the file /fees.php. The manipulation of the argument transcation_remark leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-6473. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in code-projects Online Bidding System 1.0. Affected by this issue is some unknown functionality of the file /showprod.php. The manipulation of the argument ID leads to sql injection.
This vulnerability is handled as CVE-2025-6472. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in code-projects Online Bidding System 1.0. Affected by this vulnerability is an unknown functionality of the file /administrator. The manipulation of the argument aduser leads to sql injection.
This vulnerability is known as CVE-2025-6471. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in code-projects Online Bidding System 1.0. Affected is an unknown function of the file /bidlog.php. The manipulation of the argument ID leads to sql injection.
This vulnerability is traded as CVE-2025-6470. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in code-projects Online Bidding System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /details.php. The manipulation of the argument ID leads to sql injection.
The identification of this vulnerability is CVE-2025-6469. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in code-projects Online Bidding System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /bidnow.php. The manipulation of the argument ID leads to sql injection.
This vulnerability was named CVE-2025-6468. The attack can be initiated remotely. Furthermore, there is an exploit available.