Oretnom23 Simple Subscription Website
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Oretnom23 Simple Subscription Website.
By the Year
In 2026 there have been 0 vulnerabilities in Oretnom23 Simple Subscription Website. Simple Subscription Website did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 4 | 8.88 |
| 2023 | 0 | 0.00 |
| 2022 | 1 | 9.80 |
| 2021 | 2 | 7.95 |
It may take a day or so for new Simple Subscription Website vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Oretnom23 Simple Subscription Website Security Vulnerabilities
Critical SQLi in view_application.php of SourceCodester Simple Subscr 1.0
CVE-2024-4093
8.8 - High
- April 24, 2024
A vulnerability, which was classified as critical, was found in SourceCodester Simple Subscription Website 1.0. Affected is an unknown function of the file view_application.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-261822 is the identifier assigned to this vulnerability.
SQL Injection
SourceCodester Simple Subscription Website 1.0 SQLi via manage_user.php
CVE-2024-3042
9.1 - Critical
- March 28, 2024
A vulnerability was found in SourceCodester Simple Subscription Website 1.0 and classified as critical. This issue affects some unknown processing of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258431.
SQL Injection
SQLi via id in manage_plan.php of SourceCodester Simple Subscription Website 1.0
CVE-2024-3015
8.8 - High
- March 28, 2024
A vulnerability classified as critical was found in SourceCodester Simple Subscription Website 1.0. Affected by this vulnerability is an unknown functionality of the file manage_plan.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258301 was assigned to this vulnerability.
SQL Injection
SQLi in SourceCodester Simple Subscription Website 1.0 via Actions.php
CVE-2024-3014
8.8 - High
- March 28, 2024
A vulnerability classified as critical has been found in SourceCodester Simple Subscription Website 1.0. Affected is an unknown function of the file Actions.php. The manipulation of the argument title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258300.
SQL Injection
Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the view_plan endpoint
CVE-2022-26283
9.8 - Critical
- March 21, 2022
Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the view_plan endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.
SQL Injection
Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0
CVE-2021-43141
6.1 - Medium
- November 03, 2021
Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0 via the id parameter in plan_application.
XSS
SQL Injection vulnerability exists in Sourcecodester
CVE-2021-43140
9.8 - Critical
- November 03, 2021
SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login.
SQL Injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Oretnom23 Simple Subscription Website or by Oretnom23? Click the Watch button to subscribe.