Page 6 of 37 results (0.032 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'email' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database. Online Examination System v1.0 es afectado por múltiples vulnerabilidades de inyección SQL no autenticada. El parámetro 'email' del recurso feed.php no valida los caracteres recibidos y se envían sin filtrar a la base de datos. • https://fluidattacks.com/advisories/pires https://projectworlds.in • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the login.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL. Online Examination System v1.0 es afectado por múltiples vulnerabilidades de Open Redirect. El parámetro 'q' del recurso login.php permite a un atacante redirigir a un usuario víctima a un sitio web arbitrario utilizando una URL manipulada. • https://fluidattacks.com/advisories/uchida https://projectworlds.in • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the feed.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL. Online Examination System v1.0 es afectado por múltiples vulnerabilidades de Open Redirect. El parámetro 'q' del recurso feed.php permite a un atacante redirigir a un usuario víctima a un sitio web arbitrario utilizando una URL manipulada. • https://fluidattacks.com/advisories/uchida https://projectworlds.in • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the admin.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL. Online Examination System v1.0 es afectado por múltiples vulnerabilidades de Open Redirect. El parámetro 'q' del recurso admin.php permite a un atacante redirigir a un usuario víctima a un sitio web arbitrario utilizando una URL manipulada. • https://fluidattacks.com/advisories/uchida https://projectworlds.in • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

The Online Examination System Project 1.0 version is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can craft a malicious link that, when clicked by an admin user, will delete a user account from the database without the admin's consent. The email of the user to be deleted is passed as a parameter in the URL, which can be manipulated by the attacker. This could result in a loss of data. • https://www.exploit-db.com/exploits/51511 https://www.hackersnotes.com/blog/pentest/online-examination-system-project-1-0-cross-site-request-forgery-csrf • CWE-352: Cross-Site Request Forgery (CSRF) •