Page 6 of 298 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, was found in PHPGurukul Boat Booking System 1.0. This affects an unknown part of the file change-image.php of the component Update Boat Image Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_change_image_file_upload_rce.md https://phpgurukul.com https://vuldb.com/?ctiid.280947 https://vuldb.com/?id.280947 https://vuldb.com/?submit.425440 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, has been found in PHPGurukul Boat Booking System 1.0. Affected by this issue is some unknown functionality of the file /admin/bwdates-report-details.php of the component BW Dates Report Page. The manipulation of the argument fdate/tdate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_bwdates_report_details_sqli.md https://phpgurukul.com https://vuldb.com/?ctiid.280946 https://vuldb.com/?id.280946 https://vuldb.com/?submit.425437 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical was found in PHPGurukul Boat Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/profile.php of the component My Profile Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_profile_sqli.md https://phpgurukul.com https://vuldb.com/?ctiid.280945 https://vuldb.com/?id.280945 https://vuldb.com/?submit.425434 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as problematic has been found in PHPGurukul Boat Booking System 1.0. Affected is the function session_start. The manipulation leads to session fixiation. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_session_fixation.md https://phpgurukul.com https://vuldb.com/?ctiid.280944 https://vuldb.com/?id.280944 https://vuldb.com/?submit.425414 • CWE-384: Session Fixation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/password-recovery.php of the component Reset Your Password Page. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. • https://github.com/jadu101/CVE/blob/main/phpgurukul_boat_booking_system_admin_password_recovery_sqli.md https://phpgurukul.com https://vuldb.com/?ctiid.280943 https://vuldb.com/?id.280943 https://vuldb.com/?submit.425399 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •