Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-02-11 | CVE-2025-1176 | Heap-based Buffer Overflow vulnerability in GNU Binutils 2.43 A vulnerability was found in GNU Binutils 2.43 and classified as critical. | 5.0 |
2025-02-11 | CVE-2025-1177 | Deserialization of Untrusted Data vulnerability in Xunruicms 4.6.3 A vulnerability was found in dayrui XunRuiCMS 4.6.3. | 9.8 |
2025-02-11 | CVE-2025-1173 | SQL Injection vulnerability in 1000Projects Bookstore Management System 1.0 A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. | 7.2 |
2025-02-11 | CVE-2025-1174 | Cross-site Scripting vulnerability in 1000Projects Bookstore Management System 1.0 A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as problematic. | 4.8 |
2025-02-11 | CVE-2025-1171 | Cross-site Scripting vulnerability in Fabianros Real Estate Property Management System 1.0 A vulnerability classified as problematic was found in code-projects Real Estate Property Management System 1.0. | 6.1 |
2025-02-11 | CVE-2025-1172 | SQL Injection vulnerability in 1000Projects Bookstore Management System 1.0 A vulnerability, which was classified as critical, has been found in 1000 Projects Bookstore Management System 1.0. | 8.8 |
2025-02-11 | CVE-2025-1169 | Code Injection vulnerability in Rems Image Compressor Tool 1.0 A vulnerability was found in SourceCodester Image Compressor Tool 1.0. | 6.1 |
2025-02-11 | CVE-2025-1170 | Cross-site Scripting vulnerability in Fabian Real Estate Property Management System 1.0 A vulnerability classified as problematic has been found in code-projects Real Estate Property Management System 1.0. | 5.4 |
2025-02-11 | CVE-2025-1168 | Injection vulnerability in Rems Contact Manager With Export to VCF 1.0 A vulnerability was found in SourceCodester Contact Manager with Export to VCF 1.0. | 9.8 |
2025-02-11 | CVE-2025-23189 | Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an authenticated attacker could generate technical meta-data. | 4.3 |