Show filters
40 Total Results
Displaying 1-10 of 40
Sort by:
Attacker Value
Unknown

CVE-2024-10805

Disclosure Date: November 04, 2024 (last updated November 08, 2024)
A vulnerability was found in code-projects University Event Management System 1.0. It has been classified as critical. This affects an unknown part of the file doedit.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions a confusing product name to be affected. Other parameters might be affected as well.
Attacker Value
Unknown

CVE-2024-10760

Disclosure Date: November 04, 2024 (last updated November 06, 2024)
A vulnerability was found in code-projects University Event Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dodelete.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Attacker Value
Unknown

CVE-2024-10700

Disclosure Date: November 02, 2024 (last updated November 06, 2024)
A vulnerability was found in code-projects University Event Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file submit.php. The manipulation of the argument name/email/title/Year/gender/fromdate/todate/people leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "name" to be affected. But it must be assumed that a variety of other parameters is affected too.
Attacker Value
Unknown

CVE-2024-44728

Disclosure Date: September 05, 2024 (last updated September 07, 2024)
Sourcecodehero Event Management System 1.0 allows Stored Cross-Site Scripting via parameters Full Name, Address, Email, and contact# in /clientdetails/admin/regester.php.
Attacker Value
Unknown

CVE-2024-44727

Disclosure Date: September 05, 2024 (last updated September 07, 2024)
Sourcecodehero Event Management System1.0 is vulnerable to SQL Injection via the parameter 'username' in /event/admin/login.php.
Attacker Value
Unknown

CVE-2024-33994

Disclosure Date: August 06, 2024 (last updated January 05, 2025)
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain their session details via the 'view' parameter in '/event/index.php'.
Attacker Value
Unknown

CVE-2024-33993

Disclosure Date: August 06, 2024 (last updated August 16, 2024)
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain their session details via the 'view' parameter in /candidate/index.php'.
Attacker Value
Unknown

CVE-2024-33992

Disclosure Date: August 06, 2024 (last updated August 16, 2024)
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the 'view' parameter in '/student/index.php'.
Attacker Value
Unknown

CVE-2024-33991

Disclosure Date: August 06, 2024 (last updated August 16, 2024)
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the 'view' parameter in '/eventwinner/index.php'.
Attacker Value
Unknown

CVE-2024-33990

Disclosure Date: August 06, 2024 (last updated August 16, 2024)
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the 'id' and 'view' parameters in '/user/index.php'.