Filtered by vendor Code-projects Subscriptions
Filtered by product Inventory Management Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-11250 1 Code-projects 1 Inventory Management 2024-12-10 6.3 Medium
A vulnerability was found in code-projects Inventory Management up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /model/editProduct.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2023-46582 1 Code-projects 1 Inventory Management 2024-11-21 7.8 High
SQL injection vulnerability in Inventory Management v.1.0 allows a local attacker to execute arbitrary SQL commands via the id paramter in the deleteProduct.php component.
CVE-2023-46581 1 Code-projects 1 Inventory Management 2024-11-21 5.5 Medium
SQL injection vulnerability in Inventory Management v.1.0 allows a local attacker to execute arbitrary code via the name, uname and email parameters in the registration.php component.
CVE-2023-46580 1 Code-projects 1 Inventory Management 2024-11-21 5.4 Medium
Cross-Site Scripting (XSS) vulnerability in Inventory Management V1.0 allows attackers to execute arbitrary code via the pname parameter of the editProduct.php component.
CVE-2024-8710 1 Code-projects 1 Inventory Management 2024-09-13 6.3 Medium
A vulnerability classified as critical was found in code-projects Inventory Management 1.0. Affected by this vulnerability is an unknown functionality of the file /model/viewProduct.php of the component Products Table Page. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-8605 1 Code-projects 1 Inventory Management 2024-09-13 4.3 Medium
A vulnerability classified as problematic was found in code-projects Inventory Management 1.0. This vulnerability affects unknown code of the file /view/registration.php of the component Registration Form. The manipulation with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.