Page 6 of 44 results (0.011 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was found in SourceCodester Royale Event Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /royal_event/userregister.php. The manipulation leads to improper authentication. The attack may be initiated remotely. • https://vuldb.com/?ctiid.195785 https://vuldb.com/?id.195785 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Sourcecodester Event Registration App v1.0 was discovered to contain multiple CSV injection vulnerabilities via the First Name, Contact and Remarks fields. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file. Se descubrió que la aplicación Sourcecodester Event Registration v1.0 contiene múltiples vulnerabilidades de inyección de CSV a través de los campos Nombre, Contacto y Comentarios. Estas vulnerabilidades permiten a los atacantes ejecutar código arbitrario a través de un archivo Excel manipulado. • https://github.com/RashidKhanPathan/CVE-2022-44830 • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Event Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /Royal_Event/update_image.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. Se ha detectado que Event Management System versión v1.0, contiene una vulnerabilidad de descarga de archivos arbitraria por medio del componente /Royal_Event/update_image.php. Esta vulnerabilidad permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado • https://github.com/Gsir97/bug_report/blob/main/vendors/Nikhil_B/event-management-system/RCE-1.md • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 3%CPEs: 1EXPL: 3

Royal Event Management System v1.0 was discovered to contain a SQL injection vulnerability via the todate parameter. Se ha detectado que Royal Event Management System versión v1.0, contiene una vulnerabilidad de inyección SQL por medio del parámetro todate Royal Event Management System version 1.0 suffers from a remote SQL injection vulnerability. • https://www.exploit-db.com/exploits/50934 http://packetstormsecurity.com/files/167123/Royal-Event-Management-System-1.0-SQL-Injection.html https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated https://www.sourcecodester.com/php/15238/event-management-system-project-php-source-code.html https://www.sourcecodester.com/sites/default/files/download/oretnom23/Royal%20Event.zip • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The Event List WordPress plugin before 0.8.8 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks against other admin even when the unfiltered_html is disallowed El plugin Event List de WordPress versiones anteriores a 0.8.8, no sanea ni escapa de algunos de sus parámetros, permitiendo a usuarios muy privilegiados, como los administradores, llevar a cabo ataques de tipo Cross-Site Scripting contra otros administradores, incluso cuando unfiltered_html no esta permitido The Event List WordPress plugin through 0.8.8 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks against other admin even when the unfiltered_html is disallowed • https://wpscan.com/vulnerability/74888a9f-fb75-443d-bb85-0120cbb764a0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •