Janobe Vehicle Management System
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Janobe Vehicle Management System.
By the Year
In 2026 there have been 0 vulnerabilities in Janobe Vehicle Management System. Last year, in 2025 Vehicle Management System had 2 security vulnerabilities published. Right now, Vehicle Management System is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 2 | 5.40 |
It may take a day or so for new Vehicle Management System vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Janobe Vehicle Management System Security Vulnerabilities
XSS in SourceCodester Vehicle Management System 1.0 confirmbooking.php
CVE-2025-2377
5.4 - Medium
- March 17, 2025
A vulnerability was found in SourceCodester Vehicle Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /confirmbooking.php. The manipulation of the argument id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting product names.
XSS
Vehicle Management System 1.0 SQLi via /newvehicle.php & /newdriver.php
CVE-2024-48245
- January 07, 2025
Vehicle Management System 1.0 is vulnerable to SQL Injection. A guest user can exploit vulnerable POST parameters in various administrative actions, such as booking a vehicle or confirming a booking. The affected parameters include "Booking ID", "Action Name", and "Payment Confirmation ID", which are present in /newvehicle.php and /newdriver.php.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Janobe Vehicle Management System or by Janobe? Click the Watch button to subscribe.