Total
5 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2025-13567 | 1 Angeljudesuarez | 1 Covid Tracking System | 2025-12-02 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability was detected in itsourcecode COVID Tracking System 1.0. This affects an unknown function of the file /admin/?page=establishment. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used. | |||||
| CVE-2025-13568 | 1 Angeljudesuarez | 1 Covid Tracking System | 2025-12-02 | 6.5 MEDIUM | 6.3 MEDIUM |
| A flaw has been found in itsourcecode COVID Tracking System 1.0. This impacts an unknown function of the file /admin/?page=people. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. | |||||
| CVE-2025-13569 | 1 Angeljudesuarez | 1 Covid Tracking System | 2025-12-02 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affected is an unknown function of the file /admin/?page=city. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
| CVE-2025-13570 | 1 Angeljudesuarez | 1 Covid Tracking System | 2025-12-02 | 6.5 MEDIUM | 6.3 MEDIUM |
| A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=state. Performing manipulation of the argument ID results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used. | |||||
| CVE-2025-13585 | 1 Angeljudesuarez | 1 Covid Tracking System | 2025-12-01 | 7.5 HIGH | 7.3 HIGH |
| A vulnerability was detected in code-projects COVID Tracking System 1.0. This issue affects some unknown processing of the file /login.php. The manipulation of the argument code results in sql injection. The attack may be performed from remote. The exploit is now public and may be used. | |||||
