Oretnom23 Vulnerabilities

Comprehensive security vulnerability database for Oretnom23 products

Last updated: Feb 26, 2023
Total CVEs

13

Critical

11

With Exploits

4

Last 30 Days

0

Severity Distribution

Critical11
85%
High0
0%
Medium2
15%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2023-10416.1

This vulnerability allows an attacker to inject malicious scripts into the website, which could lead to unauthorized actions or data theft from users who visit the affected page. It can be exploited remotely by manipulating a specific input field without needing any special access or credentials.

oretnom23simple responsive tourism website
Exploit Available
almost 3 years agoFeb 26, 2023
CVE-2022-313549.8

This vulnerability allows an attacker to manipulate the online car wash booking system's database, potentially gaining access to sensitive information or altering data. To exploit this, the attacker needs to send specially crafted requests to a specific URL in the system.

oretnom23online car wash booking system
Theoretical
over 3 years agoJun 2, 2022
CVE-2022-313539.8

This vulnerability allows an attacker to manipulate the database of the online car wash booking system, potentially gaining access to sensitive information or altering data. It can be exploited by sending specially crafted requests to a specific URL, making it critical for anyone using this system to secure it immediately.

oretnom23online car wash booking system
Theoretical
over 3 years agoJun 2, 2022
CVE-2022-313529.8

This vulnerability allows an attacker to manipulate the database of the online car wash booking system, potentially gaining access to sensitive information or altering data. It requires the attacker to send a specially crafted request to the manage_service.php page with a specific ID parameter.

oretnom23online car wash booking system
Theoretical
over 3 years agoJun 2, 2022
CVE-2022-313519.8

This vulnerability allows an attacker to manipulate the online car wash booking system's database by injecting harmful SQL code through a specific URL, potentially gaining access to sensitive information or altering data. To exploit this, the attacker needs to access the admin services page with the right parameters, making it critical for system security.

oretnom23online car wash booking system
Theoretical
over 3 years agoJun 2, 2022
CVE-2022-313509.8

This vulnerability allows an attacker to manipulate the database of the online car wash booking system, potentially gaining access to sensitive information or altering data. It can be exploited by sending specially crafted requests to a specific URL, making it critical for anyone using this system to secure it immediately.

oretnom23online car wash booking system
Theoretical
over 3 years agoJun 2, 2022
CVE-2022-313489.8

This vulnerability allows an attacker to manipulate the online car wash booking system's database, potentially gaining access to sensitive information or altering data. It requires the attacker to send specially crafted requests to a specific URL in the admin section of the system.

oretnom23online car wash booking system
Exploit Available
over 3 years agoJun 2, 2022
CVE-2022-313479.8

This vulnerability allows an attacker to manipulate the database of the online car wash booking system, potentially leading to unauthorized access or deletion of vehicle records. It can be exploited by sending specially crafted requests to a specific URL, making it critical for system administrators to secure this endpoint.

oretnom23online car wash booking system
Theoretical
over 3 years agoJun 2, 2022
CVE-2022-313469.8

This vulnerability allows an attacker to manipulate the online car wash booking system's database, potentially deleting services or accessing sensitive information. It requires the attacker to send a specially crafted request to a specific URL in the system.

oretnom23online car wash booking system
Theoretical
over 3 years agoJun 2, 2022
CVE-2022-313459.8

This vulnerability allows an attacker to manipulate the database of the online car wash booking system, potentially gaining access to sensitive user information or even taking control of the system. It requires the attacker to access a specific URL with a crafted request, making it relatively easy to exploit if they can reach the admin interface.

oretnom23online car wash booking system
Theoretical
over 3 years agoJun 2, 2022
CVE-2022-313449.8

This vulnerability allows an attacker to manipulate the online car wash booking system's database by sending specially crafted requests, which could lead to unauthorized access to sensitive information or even complete control over the database. The attacker needs to know the specific URL endpoint to exploit this flaw, making it crucial for users to secure their systems against such attacks.

oretnom23online car wash booking system
Exploit Available
over 3 years agoJun 2, 2022
CVE-2022-313439.8

This vulnerability allows an attacker to manipulate the online car wash booking system's database, potentially gaining access to sensitive information or altering data. To exploit this, the attacker needs to send a specially crafted request to a specific URL that includes an ID parameter.

oretnom23online car wash booking system
Theoretical
over 3 years agoJun 2, 2022
CVE-2022-313426.5

This vulnerability allows an attacker to delete any file on the server by sending a request to a specific part of the online car wash booking system. The attacker needs to know how to craft the request properly, which means they must have some understanding of how the system works.

oretnom23online car wash booking system
Exploit Available
over 3 years agoJun 2, 2022

About Oretnom23 Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Oretnom23 products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.