Filtered by vendor Donbermoy
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-2932 | 1 Donbermoy | 1 Online Chatting System | 2025-02-18 | 6.5 MEDIUM | 6.3 MEDIUM |
A vulnerability classified as critical has been found in SourceCodester Online Chatting System 1.0. Affected is an unknown function of the file admin/update_room.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258012. | |||||
CVE-2024-2754 | 1 Donbermoy | 1 Complete E-commerce Site | 2025-02-18 | 5.8 MEDIUM | 4.7 MEDIUM |
A vulnerability classified as critical has been found in SourceCodester Complete E-Commerce Site 1.0. Affected is an unknown function of the file /admin/users_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257544. | |||||
CVE-2024-4946 | 1 Donbermoy | 1 Online Art Gallery Management System | 2025-02-10 | 6.5 MEDIUM | 6.3 MEDIUM |
A vulnerability was found in SourceCodester Online Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin/adminHome.php. The manipulation of the argument sliderpic leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264481 was assigned to this vulnerability. | |||||
CVE-2024-8217 | 1 Donbermoy | 1 E-commerce Website | 2024-08-29 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability has been found in SourceCodester E-Commerce Website 1.0 and classified as critical. This vulnerability affects unknown code of the file /Admin/registration.php. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |