Page 4 of 47 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, organization owners can view the generated API KEY and USERS of other organization owners using the `http://192.168.26.128:8080/admin/api/users/<user_id>` endpoint, which exposes the details of the provided user ID. This may also expose the API KEY in the username of the user. Version 2.0-M4-2402 fixes this issue. alf.io es un sistema de reserva de entradas de código abierto. Antes de la versión 2.0-Mr-2402, los propietarios de organizaciones pueden ver la CLAVE API generada y los USUARIOS de otros propietarios de organizaciones utilizando el endpoint `http://192.168.26.128:8080/admin/api/users/`, que expone los detalles del ID de usuario proporcionado. • https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f • CWE-612: Improper Authorization of Index Containing Sensitive Information •

CVSS: 3.5EPSS: 0%CPEs: 1EXPL: 0

Alf.io is a free and open source event attendance management system. An administrator on the alf.io application is able to upload HTML files that trigger JavaScript payloads. As such, an attacker gaining administrative access to the alf.io application may be able to persist access by planting an XSS payload. This issue has been addressed in version 2.0-M4-2402. Users are advised to upgrade. • https://github.com/alfio-event/alf.io/security/advisories/GHSA-gpmg-8f92-37cf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

Alf.io is a free and open source event attendance management system. In versions prior to 2.0-M4-2402 users can access the admin area even after being invalidated/deleted. This issue has been addressed in version 2.0-M4-2402. All users are advised to upgrade. There are no known workarounds for this vulnerability. • https://github.com/alfio-event/alf.io/security/advisories/GHSA-8p6m-mm22-q893 • CWE-613: Insufficient Session Expiration •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

Missing Authorization vulnerability in Metagauss EventPrime.This issue affects EventPrime: from n/a through 3.3.9. Vulnerabilidad de autorización faltante en Metagauss EventPrime. Este problema afecta a EventPrime: desde n/a hasta 3.3.9. The EventPrime plugin for WordPress is vulnerable to unauthorized modification of data due to improper input validation in the 'save_event_booking' function in versions up to, and including, 3.3.9. This makes it possible for unauthenticated attackers to modify the price and other attributes of purchased tickets. • https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-3-3-9-broken-access-control-vulnerability?_s_id=cve • CWE-20: Improper Input Validation CWE-862: Missing Authorization •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The Eventin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the import_file() function in versions up to, and including, 3.3.52. This makes it possible for authenticated attackers, with subscriber-level access and above, to import events. • CWE-862: Missing Authorization •