Code Projects Simple Chat System
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Code Projects Simple Chat System.
By the Year
In 2025 there have been 0 vulnerabilities in Code Projects Simple Chat System. Last year, in 2024 Simple Chat System had 5 security vulnerabilities published. Right now, Simple Chat System is on track to have less security vulnerabilities in 2025 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2025 | 0 | 0.00 |
| 2024 | 5 | 8.12 |
It may take a day or so for new Simple Chat System vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Code Projects Simple Chat System Security Vulnerabilities
Simple Chat System SQL Injection Vulnerability in User Registration
CVE-2024-13039
8.8 - High
- December 30, 2024
A vulnerability was found in code-projects Simple Chat System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /add_user.php. The manipulation of the argument name/email/password/number leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
SQL Injection
Simple Chat System v1.0 XSS via Message Handler
CVE-2024-4975
6.1 - Medium
- May 16, 2024
A vulnerability, which was classified as problematic, has been found in code-projects Simple Chat System 1.0. This issue affects some unknown processing of the component Message Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264539.
XSS
Simple Chat System 1.0: XSS in /register.php via name arg
CVE-2024-4974
6.1 - Medium
- May 16, 2024
A vulnerability, which was classified as problematic, was found in code-projects Simple Chat System 1.0. Affected is an unknown function of the file /register.php. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264540.
XSS
Simple Chat System 1.0: register.php SQLi Vulnerability Remote
CVE-2024-4973
9.8 - Critical
- May 16, 2024
A vulnerability classified as critical was found in code-projects Simple Chat System 1.0. This vulnerability affects unknown code of the file /register.php. The manipulation of the argument name/number/address leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264538 is the identifier assigned to this vulnerability.
SQL Injection in Simple Chat System 1.0 via /login.php (CVE-2024-4972)
CVE-2024-4972
9.8 - Critical
- May 16, 2024
A vulnerability classified as critical has been found in code-projects Simple Chat System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument email/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264537 was assigned to this vulnerability.
SQL Injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Code Projects Simple Chat System or by Code Projects? Click the Watch button to subscribe.