Filtered by vendor Fabianros
Subscriptions
Filtered by product Chat System
Subscriptions
Total
5 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-7189 | 2 Code-projects, Fabianros | 2 Chat System, Chat System | 2025-07-13 | 6.3 Medium |
| A vulnerability, which was classified as critical, has been found in code-projects Chat System 1.0. Affected by this issue is some unknown functionality of the file /user/send_message.php. The manipulation of the argument msg leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2025-7187 | 2 Code-projects, Fabianros | 2 Chat System, Chat System | 2025-07-13 | 6.3 Medium |
| A vulnerability classified as critical has been found in code-projects Chat System 1.0. Affected is an unknown function of the file /user/fetch_member.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2025-7188 | 2 Code-projects, Fabianros | 2 Chat System, Chat System | 2025-07-13 | 6.3 Medium |
| A vulnerability classified as critical was found in code-projects Chat System 1.0. Affected by this vulnerability is an unknown functionality of the file /user/addmember.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2025-7186 | 2 Code-projects, Fabianros | 2 Chat System, Chat System | 2025-07-13 | 6.3 Medium |
| A vulnerability was found in code-projects Chat System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/fetch_chat.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2025-5881 | 2 Code-projects, Fabianros | 2 Chat System, Chat System | 2025-06-25 | 6.3 Medium |
| A vulnerability was found in code-projects Chat System up to 1.0 and classified as critical. This issue affects some unknown processing of the file /user/confirm_password.php. The manipulation of the argument cid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | ||||
Page 1 of 1.