Filtered by vendor Lerouxyxchire Subscriptions
Total 11 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-5207 1 Lerouxyxchire 1 Client Database Management System 2025-06-05 4.7 Medium
A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. Affected by this issue is some unknown functionality of the file /superadmin_update_profile.php. The manipulation of the argument nickname/email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-4909 1 Lerouxyxchire 1 Client Database Management System 2025-05-28 7.3 High
A vulnerability classified as critical was found in SourceCodester Client Database Management System 1.0. This vulnerability affects unknown code. The manipulation leads to exposure of information through directory listing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-4923 1 Lerouxyxchire 1 Client Database Management System 2025-05-28 7.3 High
A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. This issue affects some unknown processing of the file /user_delivery_update.php. The manipulation of the argument uploaded_file_cancelled leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5002 1 Lerouxyxchire 1 Client Database Management System 2025-05-28 7.3 High
A vulnerability, which was classified as critical, was found in SourceCodester Client Database Management System 1.0. This affects an unknown part of the file /user_proposal_update_order.php. The manipulation of the argument order_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-46188 1 Lerouxyxchire 1 Client Database Management System 2025-05-22 9.8 Critical
SourceCodester Client Database Management System 1.0 is vulnerable to SQL Injection in superadmin_phpmyadmin.php.
CVE-2025-46189 1 Lerouxyxchire 1 Client Database Management System 2025-05-22 9.8 Critical
SourceCodester Client Database Management System 1.0 is vulnerable to SQL Injection in user_order_customer_update.php via the order_id POST parameter.
CVE-2025-46191 1 Lerouxyxchire 1 Client Database Management System 2025-05-22 9.8 Critical
Arbitrary File Upload in user_payment_update.php in SourceCodester Client Database Management System 1.0 allows unauthenticated users to upload arbitrary files via the uploaded_file_cancelled field. Due to the absence of proper file extension checks, MIME type validation, and authentication, attackers can upload executable PHP files to a web-accessible directory (/files/). This allows them to execute arbitrary commands remotely by accessing the uploaded script, resulting in full Remote Code Execution (RCE) without authentication.
CVE-2025-46190 1 Lerouxyxchire 1 Client Database Management System 2025-05-22 9.8 Critical
SourceCodester Client Database Management System 1.0 is vulnerable to SQL Injection in user_delivery_update.php via the order_id POST parameter.
CVE-2025-46193 1 Lerouxyxchire 1 Client Database Management System 2025-05-22 9.8 Critical
SourceCodester Client Database Management System 1.0 is vulnerable to Remote code execution via Arbitrary file upload in user_proposal_update_order.php.
CVE-2025-46192 1 Lerouxyxchire 1 Client Database Management System 2025-05-22 9.8 Critical
SourceCodester Client Database Management System 1.0 is vulnerable to SQL Injection in user_payment_update.php via the order_id POST parameter.
CVE-2025-4924 1 Lerouxyxchire 1 Client Database Management System 2025-05-21 7.3 High
A vulnerability, which was classified as critical, was found in SourceCodester Client Database Management System 1.0. Affected is an unknown function of the file /user_void_transaction.php. The manipulation of the argument order_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.