Page 7 of 50 results (0.006 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A vulnerability classified as problematic has been found in SourceCodester Royale Event Management System 1.0. Affected is an unknown function of the file /royal_event/companyprofile.php. The manipulation of the argument companyname/regno/companyaddress/companyemail leads to cross site scripting. It is possible to launch the attack remotely. VDB-195786 is the identifier assigned to this vulnerability. • https://vuldb.com/?ctiid.195786 https://vuldb.com/?id.195786 https://www.sourcecodester.com/php/15238/event-management-system-project-php-source-code.html? • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was found in SourceCodester Royale Event Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /royal_event/userregister.php. The manipulation leads to improper authentication. The attack may be initiated remotely. • https://vuldb.com/?ctiid.195785 https://vuldb.com/?id.195785 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Sourcecodester Event Registration App v1.0 was discovered to contain multiple CSV injection vulnerabilities via the First Name, Contact and Remarks fields. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file. Se descubrió que la aplicación Sourcecodester Event Registration v1.0 contiene múltiples vulnerabilidades de inyección de CSV a través de los campos Nombre, Contacto y Comentarios. Estas vulnerabilidades permiten a los atacantes ejecutar código arbitrario a través de un archivo Excel manipulado. • https://github.com/RashidKhanPathan/CVE-2022-44830 • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Event Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /Royal_Event/update_image.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. Se ha detectado que Event Management System versión v1.0, contiene una vulnerabilidad de descarga de archivos arbitraria por medio del componente /Royal_Event/update_image.php. Esta vulnerabilidad permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado • https://github.com/Gsir97/bug_report/blob/main/vendors/Nikhil_B/event-management-system/RCE-1.md • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 3%CPEs: 1EXPL: 3

Royal Event Management System v1.0 was discovered to contain a SQL injection vulnerability via the todate parameter. Se ha detectado que Royal Event Management System versión v1.0, contiene una vulnerabilidad de inyección SQL por medio del parámetro todate Royal Event Management System version 1.0 suffers from a remote SQL injection vulnerability. • https://www.exploit-db.com/exploits/50934 http://packetstormsecurity.com/files/167123/Royal-Event-Management-System-1.0-SQL-Injection.html https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated https://www.sourcecodester.com/php/15238/event-management-system-project-php-source-code.html https://www.sourcecodester.com/sites/default/files/download/oretnom23/Royal%20Event.zip • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •