A vulnerability, which was classified as problematic, was found in code-projects Traffic Offense Reporting System 1.0. This affects an unknown part of the file /save-settings.php of the component Setting Handler. The manipulation of the argument site_name leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-5661. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in PHPGurukul Complaint Management System 2.0. Affected by this issue is some unknown functionality of the file /user/register-complaint.php. The manipulation of the argument noc leads to sql injection.
This vulnerability is handled as CVE-2025-5660. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in PHPGurukul Complaint Management System 2.0. Affected by this vulnerability is an unknown functionality of the file /user/profile.php. The manipulation of the argument pincode leads to sql injection.
This vulnerability is known as CVE-2025-5659. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function of the file /admin/updatecomplaint.php. The manipulation of the argument Status leads to sql injection.
This vulnerability is traded as CVE-2025-5658. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in PHPGurukul Complaint Management System 2.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument uid leads to sql injection.
The identification of this vulnerability is CVE-2025-5657. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in PHPGurukul Complaint Management System 2.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/edit-category.php. The manipulation of the argument description leads to sql injection.
This vulnerability was named CVE-2025-5656. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in PHPGurukul Complaint Management System 2.0. It has been classified as critical. This affects an unknown part of the file /admin/edit-subcategory.php. The manipulation of the argument subcategory leads to sql injection.
This vulnerability is uniquely identified as CVE-2025-5655. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in PHPGurukul Complaint Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-state.php. The manipulation of the argument description leads to sql injection.
This vulnerability is handled as CVE-2025-5654. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability has been found in PHPGurukul Complaint Management System 2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/between-date-userreport.php. The manipulation of the argument fromdate/todate leads to sql injection.
This vulnerability is known as CVE-2025-5653. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function of the file /admin/between-date-complaintreport.php. The manipulation of the argument fromdate/todate leads to sql injection.
This vulnerability is traded as CVE-2025-5652. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in code-projects Traffic Offense Reporting System 1.0. This issue affects some unknown processing of the file saveuser.php. The manipulation of the argument user_id/username/email/name/position leads to cross site scripting.
The identification of this vulnerability is CVE-2025-5651. The attack may be initiated remotely. Furthermore, there is an exploit available.