Filtered by vendor Projectworlds
Subscribe
Filtered by product Life Insurance Management System
Subscribe
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-2062 | 1 Projectworlds | 1 Life Insurance Management System | 2025-05-14 | 7.5 HIGH | 7.3 HIGH |
A vulnerability classified as critical has been found in projectworlds Life Insurance Management System 1.0. Affected is an unknown function of the file /clientStatus.php. The manipulation of the argument client_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-2063 | 1 Projectworlds | 1 Life Insurance Management System | 2025-05-14 | 7.5 HIGH | 7.3 HIGH |
A vulnerability classified as critical was found in projectworlds Life Insurance Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /deleteNominee.php. The manipulation of the argument nominee_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-2064 | 1 Projectworlds | 1 Life Insurance Management System | 2025-05-14 | 7.5 HIGH | 7.3 HIGH |
A vulnerability, which was classified as critical, has been found in projectworlds Life Insurance Management System 1.0. Affected by this issue is some unknown functionality of the file /deletePayment.php. The manipulation of the argument recipt_no leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-2065 | 1 Projectworlds | 1 Life Insurance Management System | 2025-05-14 | 7.5 HIGH | 7.3 HIGH |
A vulnerability, which was classified as critical, was found in projectworlds Life Insurance Management System 1.0. This affects an unknown part of the file /editAgent.php. The manipulation of the argument agent_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-2066 | 1 Projectworlds | 1 Life Insurance Management System | 2025-05-14 | 7.5 HIGH | 7.3 HIGH |
A vulnerability has been found in projectworlds Life Insurance Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /updateAgent.php. The manipulation of the argument agent_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-2067 | 1 Projectworlds | 1 Life Insurance Management System | 2025-05-14 | 7.5 HIGH | 7.3 HIGH |
A vulnerability was found in projectworlds Life Insurance Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /search.php. The manipulation of the argument key leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2024-36597 | 1 Projectworlds | 1 Life Insurance Management System | 2025-03-13 | N/A | 8.8 HIGH |
Aegon Life v1.0 was discovered to contain a SQL injection vulnerability via the client_id parameter at clientStatus.php. | |||||
CVE-2024-10735 | 1 Projectworlds | 1 Life Insurance Management System | 2024-11-05 | 6.5 MEDIUM | 9.8 CRITICAL |
A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /editNominee.php. The manipulation of the argument nominee_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2024-10734 | 1 Projectworlds | 1 Life Insurance Management System | 2024-11-05 | 6.5 MEDIUM | 9.8 CRITICAL |
A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been classified as critical. This affects an unknown part of the file /editPayment.php. The manipulation of the argument recipt_no leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |