Show filters
153 Total Results
Displaying 61-70 of 153
Sort by:
Attacker Value
Unknown

CVE-2022-31996

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Badminton Center Management System v1.0 is vulnerable to SQL Injection via bcms/admin/?page=sales/manage_sale&id=.
Attacker Value
Unknown

CVE-2022-30490

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Badminton Center Management System V1.0 is vulnerable to SQL Injection via parameter 'id' in /bcms/admin/court_rentals/update_status.php.
Attacker Value
Unknown

CVE-2022-30456

Disclosure Date: May 24, 2022 (last updated February 23, 2025)
Badminton Center Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via /bcms/classes/Master.php?f=save_court_rental.
Attacker Value
Unknown

CVE-2022-30455

Disclosure Date: May 24, 2022 (last updated February 23, 2025)
Badminton Center Management System 1.0 is vulnerable to SQL Injection via /bcms/classes/Master.php?f=delete_court_rental, id.
Attacker Value
Unknown

CVE-2022-1817

Disclosure Date: May 23, 2022 (last updated February 23, 2025)
A vulnerability, which was classified as problematic, was found in Badminton Center Management System. This affects the userlist module at /bcms/admin/?page=user/list. The manipulation of the argument username with the input </td><img src="" onerror="alert(1)"><td>1 leads to an authenticated cross site scripting. Exploit details have been disclosed to the public.
Attacker Value
Unknown

CVE-2021-45105

Disclosure Date: December 18, 2021 (last updated February 23, 2025)
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.
Attacker Value
Unknown

CVE-2002-20001

Disclosure Date: November 11, 2021 (last updated February 23, 2025)
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
Attacker Value
Unknown

CVE-2021-41352

Disclosure Date: October 13, 2021 (last updated November 28, 2024)
SCOM Information Disclosure Vulnerability
0
Attacker Value
Unknown

CVE-2021-38649

Disclosure Date: September 15, 2021 (last updated November 28, 2024)
Open Management Infrastructure Elevation of Privilege Vulnerability
0
Attacker Value
Unknown

CVE-2021-38645

Disclosure Date: September 15, 2021 (last updated November 28, 2024)
Open Management Infrastructure Elevation of Privilege Vulnerability
0