Overview A critical security vulnerability, identified as CVE-2025-64446, has been discovered in Fortinet FortiWeb. This vulnerability is a relative path traversal flaw that could allow an attacker to execute administrative commands on the affected system. The vulnerability impacts several versions of FortiWeb, specifically versions 8.0.0 through 8.0.1, 7.6.0 through 7.6.4, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, and 7.0.0 through 7.0.11. Technical Details CVE-2025-64446 is a relative path traversal vulnerability. This means an attacker can manipulate file paths within HTTP or HTTPS requests to access restricted directories and potentially execute administrative commands. The attacker can craft malicious requests that navigate outside…
-
-
Overview A critical SQL injection vulnerability, identified as CVE-2025-13170, has been discovered in the Simple Online Hotel Reservation System version 1.0. This vulnerability allows remote attackers to execute arbitrary SQL commands, potentially leading to data breaches, account compromise, and complete system takeover. The vulnerability resides within the /admin/edit_account.php file and is exploitable through manipulation of the admin_id parameter. A proof-of-concept exploit is publicly available, increasing the urgency for immediate mitigation. Technical Details The vulnerability exists because the /admin/edit_account.php script does not properly sanitize user-supplied input passed through the admin_id parameter. An attacker can inject malicious SQL code into this parameter,…
-
Overview A high-severity SQL injection vulnerability, identified as CVE-2025-13169, has been discovered in the Simple Online Hotel Reservation System version 1.0, developed by Code-Projects. This flaw allows remote attackers to execute arbitrary SQL commands by manipulating the `room_id` parameter in the `/add_query_reserve.php` file. The vulnerability is publicly known and actively exploitable, posing a significant risk to systems running this software. Technical Details The vulnerability lies within the `add_query_reserve.php` script, which handles reservation requests. Insufficient input sanitization of the `room_id` parameter allows attackers to inject malicious SQL code. By crafting a specific payload within the `room_id` field, an attacker can bypass…
-
Overview A significant security vulnerability, identified as CVE-2024-55016, has been discovered in PHPGurukul Student Record Management System version 3.20. This flaw allows for SQL Injection through the id and password parameters within the login.php script. Successful exploitation of this vulnerability could grant attackers unauthorized access to sensitive student data, system administration privileges, and potentially compromise the entire system. Technical Details The vulnerability resides in the login.php file of PHPGurukul Student Record Management System 3.20. The application fails to properly sanitize or parameterize user-supplied input provided via the id and password parameters in the login form. This allows an attacker to…
-
Overview CVE-2024-44640 identifies a SQL Injection vulnerability present in PHPGurukul Student Record System version 3.20. This vulnerability, located in the add-course.php file, allows attackers to potentially execute arbitrary SQL queries by manipulating the course-short, course-full, and cdate parameters. Successful exploitation could lead to unauthorized data access, modification, or deletion. Technical Details The vulnerability lies within the add-course.php file, where user-supplied input from the course-short, course-full, and cdate parameters is not properly sanitized before being used in SQL queries. This lack of sanitization allows an attacker to inject malicious SQL code into these parameters. Specifically, crafting a malicious payload within these…
-
Overview CVE-2024-44639 details a SQL Injection vulnerability present in PHPGurukul Student Record System version 3.20. This vulnerability allows an attacker to potentially execute arbitrary SQL queries, potentially leading to data breaches, modification, or deletion. The vulnerability resides within the add-subject.php file. Technical Details The vulnerability exists due to insufficient input sanitization in the add-subject.php file. Specifically, the parameters sub1, sub2, sub3, sub4, and course-short are vulnerable to SQL injection. An attacker can inject malicious SQL code through these parameters, which can then be executed by the application’s database query. The lack of proper escaping or parameterized queries allows for the…
-
Overview CVE-2024-44636 describes a SQL Injection vulnerability affecting PHPGurukul Student Record System version 3.20. This vulnerability allows a remote attacker to potentially execute arbitrary SQL commands within the application’s database, leading to data breaches, modification, or even complete system compromise. The vulnerability exists within the /admin-profile.php script. Technical Details The vulnerability stems from insufficient input sanitization within the /admin-profile.php script. Specifically, the adminname and aemailid parameters are vulnerable to SQL injection. An attacker can manipulate these parameters by injecting malicious SQL code. Because the application fails to properly validate or escape user-supplied data before incorporating it into a SQL query,…
-
Overview CVE-2024-44635 describes a Cross-Site Scripting (XSS) vulnerability found in PHPGurukul Student Record System version 3.20. This vulnerability allows attackers to inject malicious scripts into the application, potentially leading to unauthorized access, data theft, or other malicious activities. Technical Details The vulnerability exists within the /admin-profile.php page of the application. Specifically, the adminname and aemailid parameters are susceptible to XSS. An attacker can inject malicious JavaScript code into these parameters. When an administrator views the profile page, the injected script will be executed within their browser context. The lack of proper input validation and output encoding on the adminname and…
-
Overview CVE-2024-44633 identifies a critical SQL Injection vulnerability found in PHPGurukul Student Record System version 3.20. This vulnerability allows a malicious actor to potentially execute arbitrary SQL queries against the system’s database by exploiting a flaw in the change-password.php script. Successful exploitation could lead to unauthorized data access, modification, or even complete database compromise. Technical Details The vulnerability resides within the change-password.php script, specifically in the handling of the currentpassword parameter. The application fails to properly sanitize or validate user-supplied input for this parameter before incorporating it into an SQL query. As a result, an attacker can inject malicious SQL…
-
Overview CVE-2024-44632 details an SQL Injection vulnerability found in the PHPGurukul Student Record System version 3.20. This vulnerability resides within the password-recovery.php script and can be exploited through the id and emailid parameters. Successful exploitation can allow attackers to potentially gain unauthorized access to sensitive data, modify database contents, or even compromise the entire system. This article provides a detailed analysis of the vulnerability, its potential impact, and recommended mitigation steps. Technical Details The password-recovery.php script is intended to allow users to recover their passwords. However, the input validation for the id and emailid parameters is insufficient. This lack of…