Gec En Ligne

3 CVEs product

Monthly

CVE-2025-55887 MEDIUM POC This Month

Cross-Site Scripting (XSS) vulnerability was discovered in the meal reservation service ARD. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Gec En Ligne
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-55888 HIGH POC This Week

Cross-Site Scripting (XSS) vulnerability was discovered in the Ajax transaction manager endpoint of ARD. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Gec En Ligne
NVD GitHub
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-55885 MEDIUM POC This Month

SQL Injection vulnerability in Alpes Recherche et Developpement ARD GEC en Lign before v.2025-04-23 allows a remote attacker to escalate privileges via the GET parameters in index.php. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

PHP SQLi Gec En Ligne
NVD GitHub
CVSS 3.1
6.3
EPSS
0.2%
EPSS 0% CVSS 6.1
MEDIUM POC This Month

Cross-Site Scripting (XSS) vulnerability was discovered in the meal reservation service ARD. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Gec En Ligne
NVD GitHub
EPSS 0% CVSS 7.3
HIGH POC This Week

Cross-Site Scripting (XSS) vulnerability was discovered in the Ajax transaction manager endpoint of ARD. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Gec En Ligne
NVD GitHub
EPSS 0% CVSS 6.3
MEDIUM POC This Month

SQL Injection vulnerability in Alpes Recherche et Developpement ARD GEC en Lign before v.2025-04-23 allows a remote attacker to escalate privileges via the GET parameters in index.php. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

PHP SQLi Gec En Ligne
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy