Oretnom23 Vulnerabilities

Comprehensive security vulnerability database for Oretnom23 products

Last updated: Mar 8, 2026
Total CVEs

5

Critical

11

With Exploits

8

Last 30 Days

0

Severity Distribution

Critical11
220%
High0
0%
Medium5
100%
Low4
80%
DescriptionVendor / ProductExploit Status
CVE-2026-37525.1

This vulnerability allows an attacker to remotely manipulate the date parameter in the daily task report feature of the employee task management system, potentially leading to unauthorized access to the database. To exploit this flaw, the attacker simply needs to send a specially crafted request to the affected system.

oretnom23employee task management system
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-37515.1

This vulnerability allows an attacker to execute malicious SQL commands on the employee task management system, potentially accessing or manipulating sensitive data. It can be exploited remotely by sending specially crafted requests to a specific part of the application without needing any special access or credentials.

oretnom23employee task management system
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-37466.9

An attacker can exploit a vulnerability in the login feature of a tourism website to execute unauthorized SQL commands, potentially gaining access to sensitive data in the database. This can be done remotely by manipulating the username input, and the exploit is publicly known, making it easier for attackers to take advantage of it.

oretnom23simple responsive tourism website
Exploit Available
about 1 month agoMar 8, 2026
CVE-2023-10416.1

This vulnerability allows an attacker to inject malicious scripts into the website, which could lead to unauthorized actions or data theft from users who visit the affected page. It can be exploited remotely by manipulating a specific input field without needing any special access or credentials.

oretnom23simple responsive tourism website
Exploit Available
about 3 years agoFeb 26, 2023
CVE-2022-313426.5

This vulnerability allows an attacker to delete any file on the server by sending a request to a specific part of the online car wash booking system. The attacker needs to know how to craft the request properly, which means they must have some understanding of how the system works.

oretnom23online car wash booking system
Exploit Available
almost 4 years agoJun 2, 2022

About Oretnom23 Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Oretnom23 products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.