Vulnerabilities (CVE)

Filtered by vendor Razormist Subscribe
Filtered by product Student Result Management System
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-5726 1 Razormist 1 Student Result Management System 2025-06-10 3.3 LOW 2.4 LOW
A vulnerability was found in SourceCodester Student Result Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /script/academic/division-system of the component Division System Page. The manipulation of the argument Division leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5727 1 Razormist 1 Student Result Management System 2025-06-10 3.3 LOW 2.4 LOW
A vulnerability classified as problematic has been found in SourceCodester Student Result Management System 1.0. This affects an unknown part of the file /script/academic/announcement of the component Announcement Page. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5721 1 Razormist 1 Student Result Management System 2025-06-10 3.3 LOW 2.4 LOW
A vulnerability, which was classified as problematic, was found in SourceCodester Student Result Management System 1.0. This affects an unknown part of the file /script/academic/core/update_profile of the component Profile Setting Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5649 1 Razormist 1 Student Result Management System 2025-06-10 5.0 MEDIUM 5.3 MEDIUM
A vulnerability classified as critical has been found in SourceCodester Student Result Management System 1.0. This affects an unknown part of the file /admin/core/new_user of the component Register Interface. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.