4 results (0.031 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, has been found in Codezips Free Exam Hall Seating Management System 1.0. This issue affects some unknown processing of the file /pages/save_user.php. The manipulation of the argument image leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Charlotte008/cve/issues/3 https://vuldb.com/?ctiid.282953 https://vuldb.com/?id.282953 https://vuldb.com/?submit.436478 • CWE-266: Incorrect Privilege Assignment CWE-284: Improper Access Control CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical has been found in Codezips Free Exam Hall Seating Management System 1.0. Affected is an unknown function of the file /teacher.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Scholar-XD/CVE/issues/1 https://vuldb.com/?ctiid.282906 https://vuldb.com/?id.282906 https://vuldb.com/?submit.435487 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in Codezips Free Exam Hall Seating Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /student.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. • https://github.com/EddieAy/cve/issues/3 https://vuldb.com/?ctiid.282905 https://vuldb.com/?id.282905 https://vuldb.com/?submit.435425 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical was found in Codezips Free Exam Hall Seating Management System 1.0. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/ppp-src/CVE/issues/26 https://vuldb.com/?ctiid.282448 https://vuldb.com/?id.282448 https://vuldb.com/?submit.432719 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •