Filtered by vendor Facebook-julykringcadayona
Subscriptions
Total
4 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-13581 | 2 Facebook-julykringcadayona, Itsourcecode | 2 Student Information System, Student Information Management System | 2025-12-01 | 6.3 Medium |
| A vulnerability was identified in itsourcecode Student Information System 1.0. Affected by this vulnerability is an unknown functionality of the file /schedule_edit1.php. Such manipulation of the argument schedule_id leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. | ||||
| CVE-2025-13325 | 2 Facebook-julykringcadayona, Itsourcecode | 2 Student Information System, Student Information Management System | 2025-11-19 | 6.3 Medium |
| A vulnerability was determined in itsourcecode Student Information System 1.0. The affected element is an unknown function of the file /enrollment_edit1.php. Executing manipulation of the argument en_id can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. | ||||
| CVE-2025-10613 | 2 Facebook-julykringcadayona, Itsourcecode | 2 Student Information System, Student Information Management System | 2025-09-20 | 6.3 Medium |
| A vulnerability has been found in itsourcecode Student Information System 1.0. The affected element is an unknown function of the file /leveledit1.php. Such manipulation of the argument level_id leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2025-9679 | 2 Facebook-julykringcadayona, Itsourcecode | 2 Student Information System, Student Information Management System | 2025-09-04 | 7.3 High |
| A security vulnerability has been detected in itsourcecode Student Information System 1.0. This affects an unknown function of the file /course_edit1.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. | ||||
Page 1 of 1.