📦 Webitr
by Uniong
🔍 What is Webitr?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
CVE-2025-9254 is a critical authentication bypass vulnerability in WebITR software developed by Uniong. Unauthenticated remote attackers can exploit this flaw to log into the system as any user, inclu...
WebITR software developed by Uniong contains an authentication bypass vulnerability that allows authenticated remote attackers to log into the system as any user by modifying a specific parameter. Att...
CVE-2025-13771 is an arbitrary file read vulnerability in WebITR software developed by Uniong. Authenticated remote attackers can exploit relative path traversal to download arbitrary system files fro...
CVE-2025-13769 is a SQL injection vulnerability in WebITR software developed by Uniong. Authenticated remote attackers can execute arbitrary SQL commands to read sensitive database contents. Organizat...
WebITR software developed by Uniong contains a SQL injection vulnerability that allows authenticated remote attackers to execute arbitrary SQL commands and read database contents. This affects organiz...
CVE-2025-9256 is an arbitrary file reading vulnerability in WebITR software developed by Uniong. Remote attackers with regular user privileges can exploit absolute path traversal to download arbitrary...
CVE-2025-9257 is an arbitrary file reading vulnerability in WebITR software developed by Uniong. Remote attackers with regular user privileges can exploit absolute path traversal to download arbitrary...
CVE-2025-9258 is an arbitrary file reading vulnerability in WebITR software developed by Uniong. Remote attackers with regular user privileges can exploit absolute path traversal to download arbitrary...
CVE-2025-9259 is an arbitrary file reading vulnerability in WebITR software developed by Uniong. Remote attackers with regular user privileges can exploit absolute path traversal to download arbitrary...
WebITR from Uniong has an Open Redirect vulnerability that allows attackers to create malicious URLs that appear legitimate. When users click these links, they can be redirected to phishing sites whil...