NA - CVE-2025-40731 - SQL injection vulnerability in Daily Expense...
SQL injection vulnerability in Daily Expense Manager v1.0. This vulnerability allows an attacker to retrieve, create, update and delete databases through the pname, pprice and id parameters in...
NA - CVE-2025-40732 - user enumeration vulnerability in Daily Expense...
user enumeration vulnerability in Daily Expense Manager v1.0. To exploit this vulnerability a POST request must be sent using the name parameter in /check.php
NA - CVE-2025-40733 - Reflected Cross-Site Scripting (XSS)...
Reflected Cross-Site Scripting (XSS) vulnerability in Daily Expense Manager v1.0. This vulnerability allows an attacker to execute JavaScript code by sending a POST request through the username...
NA - CVE-2025-40734 - Reflected Cross-Site Scripting (XSS)...
Reflected Cross-Site Scripting (XSS) vulnerability in Daily Expense Manager v1.0. This vulnerability allows an attacker to execute JavaScript code by sending a POST request through the password and...
Medium - CVE-2025-6899 - A vulnerability, which was classified as...
A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ and DI-8200G 17.12.20A1/19.12.25A1. This affects an unknown part of the file msp_info.htm. The manipulation of the...
Medium - CVE-2025-6900 - A vulnerability has been found in code-projects...
A vulnerability has been found in code-projects Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-book.php. The manipulation of the argument...
High - CVE-2024-8419 - The endpoint hosts a script that allows an...
The endpoint hosts a script that allows an unauthorized remote attacker to put the system in a fail-safe state over the network due to missing authentication.
NA - CVE-2025-41439 - A reflected cross-site scripting vulnerability...
A reflected cross-site scripting vulnerability via a specific parameter exists in SLNX Help Documentation of RICOH Streamline NX. If this vulnerability is exploited, an arbitrary script may be...