Page 4 of 20 results (0.010 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A vulnerability classified as problematic has been found in Zoo Management System 1.0. Affected is an unknown function of the file admin/manage-ticket.php. The manipulation with the input <script>alert(1)</script> leads to cross site scripting. It is possible to launch the attack remotely. Se ha encontrado una vulnerabilidad clasificada como problemática en Zoo Management System versión 1.0. • https://vuldb.com/?id.178254 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A vulnerability, which was classified as problematic, has been found in Zoo Management System 1.0. Affected by this issue is /zoo/admin/public_html/view_accounts?type=zookeeper of the content module. The manipulation of the argument admin_name with the input <script>alert(1)</script> leads to an authenticated cross site scripting. Exploit details have been disclosed to the public. • https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Zoo-Management-System/Zoo-Management-System%28XSS%29.md https://vuldb.com/?id.200558 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

Zoo Management System v1.0 was discovered to contain a SQL injection vulnerability at /public_html/animals via the class_id parameter. Se ha detectado que Zoo Management System versión v1.0, contiene una vulnerabilidad de inyección SQL en /public_html/animals por medio del parámetro class_id PHPGurukul Zoo Management System version 1.0 suffers from a remote SQL injection vulnerability. • http://packetstormsecurity.com/files/166648/PHPGurukul-Zoo-Management-System-1.0-SQL-Injection.html https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20SQLI/POC.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 7%CPEs: 1EXPL: 3

Zoo Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /public_html/apply_vacancy. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. Se ha detectado que Zoo Management System versión v1.0, contiene una vulnerabilidad de carga de archivos arbitraria por medio de /public_html/apply_vacancy. Esta vulnerabilidad permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado PHPGurukul Zoo Management System version 1.0 suffers from a remote shell upload vulnerability. • http://packetstormsecurity.com/files/166651/PHPGurukul-Zoo-Management-System-1.0-Shell-Upload.html https://drive.google.com/file/d/14WEhaUdOaKdwM8Mlztuko4nnQsmoe89O/view?usp=sharing https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20Upload%20%2B%20RCE/POC.md • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

PHPGURUKUL Zoo Management System Using PHP and MySQL version 1.0 is affected by: SQL Injection via zms/animal-detail.php. PHPGURUKUL Zoo Management System Using PHP and MySQL versión 1.0, está afectado por: Inyección SQL por medio de un archivo zms/animal-detail.php • https://github.com/Ko-kn3t/CVE-2020-25487 http://phpgurukul.com https://phpgurukul.com/zoo-management-system-using-php-and-mysql • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •