Page 68 of 507 results (0.009 seconds)

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Prison Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /Admin/user-record.php. The manipulation of the argument txtfullname leads to cross site scripting. The attack can be launched remotely. • https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md https://vuldb.com/?ctiid.263131 https://vuldb.com/?id.263131 https://vuldb.com/?submit.329780 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as problematic was found in SourceCodester Prison Management System 1.0. This vulnerability affects unknown code of the file /Employee/edit-profile.php. The manipulation of the argument txtfullname/txtdob/txtaddress/txtqualification/cmddept/cmdemployeetype/txtappointment leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md https://vuldb.com/?ctiid.263116 https://vuldb.com/?id.263116 https://vuldb.com/?submit.329673 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Prison Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /Employee/edit-photo.php. The manipulation of the argument userImage leads to unrestricted upload. The attack can be initiated remotely. • https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/file_upload.md https://vuldb.com/?ctiid.263104 https://vuldb.com/?id.263104 https://vuldb.com/?submit.329639 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in SourceCodester Pisay Online E-Learning System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /lesson/controller.php. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/CveSecLook/cve/issues/19 https://vuldb.com/?ctiid.262489 https://vuldb.com/?id.262489 https://vuldb.com/?submit.324929 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as critical, was found in SourceCodester Simple Subscription Website 1.0. Affected is an unknown function of the file view_application.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/4wchen/Cve/blob/main/Simple%20Subscription%20Website%20with%20Admin%20System%20view_application.php%20has%20Sqlinjection.pdf https://vuldb.com/?ctiid.261822 https://vuldb.com/?id.261822 https://vuldb.com/?submit.321505 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •