Vulnerabilities (CVE)

Filtered by vendor Carmelogarcia Subscribe
Filtered by product Traffic Offense Reporting System
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-5757 1 Carmelogarcia 1 Traffic Offense Reporting System 2025-06-10 4.0 MEDIUM 3.5 LOW
A vulnerability was found in code-projects Traffic Offense Reporting System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /save-reported.php. The manipulation of the argument offence_id/vehicle_no/driver_license/name/address/gender/officer_reporting/offence leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5651 1 Carmelogarcia 1 Traffic Offense Reporting System 2025-06-10 4.0 MEDIUM 3.5 LOW
A vulnerability, which was classified as problematic, has been found in code-projects Traffic Offense Reporting System 1.0. This issue affects some unknown processing of the file saveuser.php. The manipulation of the argument user_id/username/email/name/position leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5661 1 Carmelogarcia 1 Traffic Offense Reporting System 2025-06-10 3.3 LOW 2.4 LOW
A vulnerability, which was classified as problematic, was found in code-projects Traffic Offense Reporting System 1.0. This affects an unknown part of the file /save-settings.php of the component Setting Handler. The manipulation of the argument site_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-5732 1 Carmelogarcia 1 Traffic Offense Reporting System 2025-06-10 5.0 MEDIUM 4.3 MEDIUM
A vulnerability, which was classified as problematic, was found in code-projects Traffic Offense Reporting System 1.0. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.