Vulnerabilites related to SourceCodester - Event Registration System
cve-2024-5122
Vulnerability from cvelistv5
Published
2024-05-20 07:00
Modified
2024-08-01 21:03
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
A vulnerability was found in SourceCodester Event Registration System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /registrar/. The manipulation of the argument search leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-265202 is the identifier assigned to this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.265202 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.265202 | signature, permissions-required | |
https://vuldb.com/?submit.338615 | third-party-advisory | |
https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%204.md | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SourceCodester | Event Registration System |
Version: 1.0 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:sourcecodester:event_registration_system:1.0:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "event_registration_system", vendor: "sourcecodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-5122", options: [ { Exploitation: "poc", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-05-21T15:44:50.863828Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T18:02:46.086Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:03:10.767Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "VDB-265202 | SourceCodester Event Registration System sql injection", tags: [ "vdb-entry", "technical-description", "x_transferred", ], url: "https://vuldb.com/?id.265202", }, { name: "VDB-265202 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", "x_transferred", ], url: "https://vuldb.com/?ctiid.265202", }, { name: "Submit #338615 | SourceCodester Event Registration System 1.0 SQL Injection", tags: [ "third-party-advisory", "x_transferred", ], url: "https://vuldb.com/?submit.338615", }, { tags: [ "exploit", "x_transferred", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%204.md", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Event Registration System", vendor: "SourceCodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], credits: [ { lang: "en", type: "reporter", value: "Burak (VulDB User)", }, ], descriptions: [ { lang: "en", value: "A vulnerability was found in SourceCodester Event Registration System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /registrar/. The manipulation of the argument search leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-265202 is the identifier assigned to this vulnerability.", }, { lang: "de", value: "Eine kritische Schwachstelle wurde in SourceCodester Event Registration System 1.0 ausgemacht. Dies betrifft einen unbekannten Teil der Datei /registrar/. Durch die Manipulation des Arguments search mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.", }, ], metrics: [ { cvssV4_0: { baseScore: 6.9, baseSeverity: "MEDIUM", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", version: "4.0", }, }, { cvssV3_1: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { cvssV3_0: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, { cvssV2_0: { baseScore: 7.5, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 SQL Injection", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-20T07:00:04.927Z", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { name: "VDB-265202 | SourceCodester Event Registration System sql injection", tags: [ "vdb-entry", "technical-description", ], url: "https://vuldb.com/?id.265202", }, { name: "VDB-265202 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", ], url: "https://vuldb.com/?ctiid.265202", }, { name: "Submit #338615 | SourceCodester Event Registration System 1.0 SQL Injection", tags: [ "third-party-advisory", ], url: "https://vuldb.com/?submit.338615", }, { tags: [ "exploit", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%204.md", }, ], timeline: [ { lang: "en", time: "2024-05-19T00:00:00.000Z", value: "Advisory disclosed", }, { lang: "en", time: "2024-05-19T02:00:00.000Z", value: "VulDB entry created", }, { lang: "en", time: "2024-05-19T13:39:46.000Z", value: "VulDB entry last update", }, ], title: "SourceCodester Event Registration System sql injection", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2024-5122", datePublished: "2024-05-20T07:00:04.927Z", dateReserved: "2024-05-19T11:34:30.122Z", dateUpdated: "2024-08-01T21:03:10.767Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-5121
Vulnerability from cvelistv5
Published
2024-05-20 06:31
Modified
2024-08-01 21:03
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
3.5 (Low) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
3.5 (Low) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
EPSS score ?
Summary
A vulnerability was found in SourceCodester Event Registration System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /registrar/?page=registration. The manipulation of the argument e leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265201 was assigned to this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.265201 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.265201 | signature, permissions-required | |
https://vuldb.com/?submit.338617 | third-party-advisory | |
https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%202.md | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SourceCodester | Event Registration System |
Version: 1.0 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-5121", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-05-20T13:59:41.765349Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T18:02:05.671Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:03:10.676Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "VDB-265201 | SourceCodester Event Registration System cross site scripting", tags: [ "vdb-entry", "technical-description", "x_transferred", ], url: "https://vuldb.com/?id.265201", }, { name: "VDB-265201 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", "x_transferred", ], url: "https://vuldb.com/?ctiid.265201", }, { name: "Submit #338617 | SourceCodester Event Registration System 1.0 Cross Site Scripting", tags: [ "third-party-advisory", "x_transferred", ], url: "https://vuldb.com/?submit.338617", }, { tags: [ "exploit", "x_transferred", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%202.md", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Event Registration System", vendor: "SourceCodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], credits: [ { lang: "en", type: "reporter", value: "Burak (VulDB User)", }, ], descriptions: [ { lang: "en", value: "A vulnerability was found in SourceCodester Event Registration System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /registrar/?page=registration. The manipulation of the argument e leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265201 was assigned to this vulnerability.", }, { lang: "de", value: "In SourceCodester Event Registration System 1.0 wurde eine problematische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalität der Datei /registrar/?page=registration. Mit der Manipulation des Arguments e mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.", }, ], metrics: [ { cvssV4_0: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", version: "4.0", }, }, { cvssV3_1: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, }, { cvssV3_0: { baseScore: 3.5, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, }, { cvssV2_0: { baseScore: 4, vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79 Cross Site Scripting", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-20T06:31:04.701Z", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { name: "VDB-265201 | SourceCodester Event Registration System cross site scripting", tags: [ "vdb-entry", "technical-description", ], url: "https://vuldb.com/?id.265201", }, { name: "VDB-265201 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", ], url: "https://vuldb.com/?ctiid.265201", }, { name: "Submit #338617 | SourceCodester Event Registration System 1.0 Cross Site Scripting", tags: [ "third-party-advisory", ], url: "https://vuldb.com/?submit.338617", }, { tags: [ "exploit", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%202.md", }, ], timeline: [ { lang: "en", time: "2024-05-19T00:00:00.000Z", value: "Advisory disclosed", }, { lang: "en", time: "2024-05-19T02:00:00.000Z", value: "VulDB entry created", }, { lang: "en", time: "2024-05-19T13:39:44.000Z", value: "VulDB entry last update", }, ], title: "SourceCodester Event Registration System cross site scripting", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2024-5121", datePublished: "2024-05-20T06:31:04.701Z", dateReserved: "2024-05-19T11:34:27.212Z", dateUpdated: "2024-08-01T21:03:10.676Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-5119
Vulnerability from cvelistv5
Published
2024-05-20 05:31
Modified
2024-08-01 21:03
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
A vulnerability was found in SourceCodester Event Registration System 1.0 and classified as critical. This issue affects some unknown processing of the file /classes/Master.php?f=load_registration. The manipulation of the argument last_id/event_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265199.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.265199 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.265199 | signature, permissions-required | |
https://vuldb.com/?submit.338613 | third-party-advisory | |
https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%202.md | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SourceCodester | Event Registration System |
Version: 1.0 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:sourcecodester:event_registration_system:1.0:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "event_registration_system", vendor: "sourcecodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-5119", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-05-20T16:19:08.588259Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T18:02:25.994Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:03:10.709Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "VDB-265199 | SourceCodester Event Registration System sql injection", tags: [ "vdb-entry", "technical-description", "x_transferred", ], url: "https://vuldb.com/?id.265199", }, { name: "VDB-265199 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", "x_transferred", ], url: "https://vuldb.com/?ctiid.265199", }, { name: "Submit #338613 | SourceCodester Event Registration System 1.0 SQL Injection", tags: [ "third-party-advisory", "x_transferred", ], url: "https://vuldb.com/?submit.338613", }, { tags: [ "exploit", "x_transferred", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%202.md", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Event Registration System", vendor: "SourceCodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], credits: [ { lang: "en", type: "reporter", value: "Burak (VulDB User)", }, ], descriptions: [ { lang: "en", value: "A vulnerability was found in SourceCodester Event Registration System 1.0 and classified as critical. This issue affects some unknown processing of the file /classes/Master.php?f=load_registration. The manipulation of the argument last_id/event_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265199.", }, { lang: "de", value: "Eine kritische Schwachstelle wurde in SourceCodester Event Registration System 1.0 gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /classes/Master.php?f=load_registration. Dank der Manipulation des Arguments last_id/event_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.", }, ], metrics: [ { cvssV4_0: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", version: "4.0", }, }, { cvssV3_1: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { cvssV3_0: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, { cvssV2_0: { baseScore: 6.5, vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 SQL Injection", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-20T05:31:04.672Z", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { name: "VDB-265199 | SourceCodester Event Registration System sql injection", tags: [ "vdb-entry", "technical-description", ], url: "https://vuldb.com/?id.265199", }, { name: "VDB-265199 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", ], url: "https://vuldb.com/?ctiid.265199", }, { name: "Submit #338613 | SourceCodester Event Registration System 1.0 SQL Injection", tags: [ "third-party-advisory", ], url: "https://vuldb.com/?submit.338613", }, { tags: [ "exploit", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%202.md", }, ], timeline: [ { lang: "en", time: "2024-05-19T00:00:00.000Z", value: "Advisory disclosed", }, { lang: "en", time: "2024-05-19T02:00:00.000Z", value: "VulDB entry created", }, { lang: "en", time: "2024-05-19T13:39:41.000Z", value: "VulDB entry last update", }, ], title: "SourceCodester Event Registration System sql injection", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2024-5119", datePublished: "2024-05-20T05:31:04.672Z", dateReserved: "2024-05-19T11:34:21.396Z", dateUpdated: "2024-08-01T21:03:10.709Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-5123
Vulnerability from cvelistv5
Published
2024-05-20 07:31
Modified
2024-08-01 21:03
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
EPSS score ?
Summary
A vulnerability classified as problematic has been found in SourceCodester Event Registration System 1.0. This affects an unknown part of the file /registrar/. The manipulation of the argument searchbar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265203.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.265203 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.265203 | signature, permissions-required | |
https://vuldb.com/?submit.338616 | third-party-advisory | |
https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%201.md | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SourceCodester | Event Registration System |
Version: 1.0 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:event_registration_system_project:event_registration_system:1.0:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "event_registration_system", vendor: "event_registration_system_project", versions: [ { status: "affected", version: "1.0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-5123", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-05-20T14:33:44.776321Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T18:02:21.557Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:03:10.664Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "VDB-265203 | SourceCodester Event Registration System cross site scripting", tags: [ "vdb-entry", "technical-description", "x_transferred", ], url: "https://vuldb.com/?id.265203", }, { name: "VDB-265203 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", "x_transferred", ], url: "https://vuldb.com/?ctiid.265203", }, { name: "Submit #338616 | SourceCodester Event Registration System 1.0 Cross Site Scripting", tags: [ "third-party-advisory", "x_transferred", ], url: "https://vuldb.com/?submit.338616", }, { tags: [ "exploit", "x_transferred", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%201.md", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Event Registration System", vendor: "SourceCodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], credits: [ { lang: "en", type: "reporter", value: "Burak (VulDB User)", }, ], descriptions: [ { lang: "en", value: "A vulnerability classified as problematic has been found in SourceCodester Event Registration System 1.0. This affects an unknown part of the file /registrar/. The manipulation of the argument searchbar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265203.", }, { lang: "de", value: "Es wurde eine Schwachstelle in SourceCodester Event Registration System 1.0 entdeckt. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /registrar/. Durch Manipulation des Arguments searchbar mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.", }, ], metrics: [ { cvssV4_0: { baseScore: 6.9, baseSeverity: "MEDIUM", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", version: "4.0", }, }, { cvssV3_1: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, }, { cvssV3_0: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.0", }, }, { cvssV2_0: { baseScore: 5, vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79 Cross Site Scripting", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-20T07:31:04.390Z", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { name: "VDB-265203 | SourceCodester Event Registration System cross site scripting", tags: [ "vdb-entry", "technical-description", ], url: "https://vuldb.com/?id.265203", }, { name: "VDB-265203 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", ], url: "https://vuldb.com/?ctiid.265203", }, { name: "Submit #338616 | SourceCodester Event Registration System 1.0 Cross Site Scripting", tags: [ "third-party-advisory", ], url: "https://vuldb.com/?submit.338616", }, { tags: [ "exploit", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%201.md", }, ], timeline: [ { lang: "en", time: "2024-05-19T00:00:00.000Z", value: "Advisory disclosed", }, { lang: "en", time: "2024-05-19T02:00:00.000Z", value: "VulDB entry created", }, { lang: "en", time: "2024-05-19T13:39:47.000Z", value: "VulDB entry last update", }, ], title: "SourceCodester Event Registration System cross site scripting", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2024-5123", datePublished: "2024-05-20T07:31:04.390Z", dateReserved: "2024-05-19T11:34:32.972Z", dateUpdated: "2024-08-01T21:03:10.664Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-5118
Vulnerability from cvelistv5
Published
2024-05-20 05:00
Modified
2024-08-01 21:03
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-265198 is the identifier assigned to this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.265198 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.265198 | signature, permissions-required | |
https://vuldb.com/?submit.338612 | third-party-advisory | |
https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SourceCodester | Event Registration System |
Version: 1.0 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:sourcecodester:event_registration_system:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "event_registration_system", vendor: "sourcecodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-5118", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-07-18T18:08:41.007664Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-18T18:11:35.620Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:03:10.928Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "VDB-265198 | SourceCodester Event Registration System login.php sql injection", tags: [ "vdb-entry", "technical-description", "x_transferred", ], url: "https://vuldb.com/?id.265198", }, { name: "VDB-265198 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", "x_transferred", ], url: "https://vuldb.com/?ctiid.265198", }, { name: "Submit #338612 | SourceCodester Event Registration System 1.0 SQL Injection", tags: [ "third-party-advisory", "x_transferred", ], url: "https://vuldb.com/?submit.338612", }, { tags: [ "exploit", "x_transferred", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Event Registration System", vendor: "SourceCodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], credits: [ { lang: "en", type: "reporter", value: "Burak (VulDB User)", }, ], descriptions: [ { lang: "en", value: "A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-265198 is the identifier assigned to this vulnerability.", }, { lang: "de", value: "In SourceCodester Event Registration System 1.0 wurde eine kritische Schwachstelle gefunden. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /admin/login.php. Durch Beeinflussen des Arguments username/password mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.", }, ], metrics: [ { cvssV4_0: { baseScore: 6.9, baseSeverity: "MEDIUM", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", version: "4.0", }, }, { cvssV3_1: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { cvssV3_0: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, { cvssV2_0: { baseScore: 7.5, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 SQL Injection", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-20T05:00:04.991Z", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { name: "VDB-265198 | SourceCodester Event Registration System login.php sql injection", tags: [ "vdb-entry", "technical-description", ], url: "https://vuldb.com/?id.265198", }, { name: "VDB-265198 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", ], url: "https://vuldb.com/?ctiid.265198", }, { name: "Submit #338612 | SourceCodester Event Registration System 1.0 SQL Injection", tags: [ "third-party-advisory", ], url: "https://vuldb.com/?submit.338612", }, { tags: [ "exploit", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md", }, ], timeline: [ { lang: "en", time: "2024-05-19T00:00:00.000Z", value: "Advisory disclosed", }, { lang: "en", time: "2024-05-19T02:00:00.000Z", value: "VulDB entry created", }, { lang: "en", time: "2024-05-19T13:39:39.000Z", value: "VulDB entry last update", }, ], title: "SourceCodester Event Registration System login.php sql injection", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2024-5118", datePublished: "2024-05-20T05:00:04.991Z", dateReserved: "2024-05-19T11:34:18.964Z", dateUpdated: "2024-08-01T21:03:10.928Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-5117
Vulnerability from cvelistv5
Published
2024-05-20 04:31
Modified
2024-08-01 21:03
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
A vulnerability, which was classified as critical, was found in SourceCodester Event Registration System 1.0. This affects an unknown part of the file portal.php. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265197 was assigned to this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.265197 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.265197 | signature, permissions-required | |
https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SourceCodester | Event Registration System |
Version: 1.0 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-5117", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-05-20T17:09:07.627352Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T18:02:09.838Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:03:10.750Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "VDB-265197 | SourceCodester Event Registration System portal.php sql injection", tags: [ "vdb-entry", "technical-description", "x_transferred", ], url: "https://vuldb.com/?id.265197", }, { name: "VDB-265197 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", "x_transferred", ], url: "https://vuldb.com/?ctiid.265197", }, { tags: [ "exploit", "x_transferred", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Event Registration System", vendor: "SourceCodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability, which was classified as critical, was found in SourceCodester Event Registration System 1.0. This affects an unknown part of the file portal.php. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265197 was assigned to this vulnerability.", }, { lang: "de", value: "Es wurde eine kritische Schwachstelle in SourceCodester Event Registration System 1.0 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei portal.php. Durch das Beeinflussen des Arguments username/password mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.", }, ], metrics: [ { cvssV4_0: { baseScore: 6.9, baseSeverity: "MEDIUM", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", version: "4.0", }, }, { cvssV3_1: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { cvssV3_0: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, { cvssV2_0: { baseScore: 7.5, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 SQL Injection", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-20T04:31:03.945Z", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { name: "VDB-265197 | SourceCodester Event Registration System portal.php sql injection", tags: [ "vdb-entry", "technical-description", ], url: "https://vuldb.com/?id.265197", }, { name: "VDB-265197 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", ], url: "https://vuldb.com/?ctiid.265197", }, { tags: [ "exploit", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md", }, ], timeline: [ { lang: "en", time: "2024-05-19T00:00:00.000Z", value: "Advisory disclosed", }, { lang: "en", time: "2024-05-19T02:00:00.000Z", value: "VulDB entry created", }, { lang: "en", time: "2024-05-19T13:39:38.000Z", value: "VulDB entry last update", }, ], title: "SourceCodester Event Registration System portal.php sql injection", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2024-5117", datePublished: "2024-05-20T04:31:03.945Z", dateReserved: "2024-05-19T11:34:16.772Z", dateUpdated: "2024-08-01T21:03:10.750Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-4232
Vulnerability from cvelistv5
Published
2022-11-30 00:00
Modified
2024-08-03 01:34
Severity ?
EPSS score ?
Summary
A vulnerability, which was classified as critical, was found in SourceCodester Event Registration System 1.0. Affected is an unknown function. The manipulation of the argument cmd leads to unrestricted upload. It is possible to launch the attack remotely. VDB-214590 is the identifier assigned to this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.214590 |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SourceCodester | Event Registration System |
Version: 1.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T01:34:49.949Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://vuldb.com/?id.214590", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Event Registration System", vendor: "SourceCodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability, which was classified as critical, was found in SourceCodester Event Registration System 1.0. Affected is an unknown function. The manipulation of the argument cmd leads to unrestricted upload. It is possible to launch the attack remotely. VDB-214590 is the identifier assigned to this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-266", description: "CWE-266 Incorrect Privilege Assignment -> CWE-284 Improper Access Controls -> CWE-434 Unrestricted Upload", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-30T00:00:00", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { url: "https://vuldb.com/?id.214590", }, ], title: "SourceCodester Event Registration System unrestricted upload", x_generator: "vuldb.com", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2022-4232", datePublished: "2022-11-30T00:00:00", dateReserved: "2022-11-30T00:00:00", dateUpdated: "2024-08-03T01:34:49.949Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-4233
Vulnerability from cvelistv5
Published
2022-11-30 00:00
Modified
2025-04-15 13:10
Severity ?
EPSS score ?
Summary
A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /event/admin/?page=user/list. The manipulation of the argument First Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-214591.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.214591 |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SourceCodester | Event Registration System |
Version: 1.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T01:34:49.870Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://vuldb.com/?id.214591", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-4233", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-04-14T17:04:56.688058Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-04-15T13:10:49.613Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Event Registration System", vendor: "SourceCodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /event/admin/?page=user/list. The manipulation of the argument First Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-214591.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 2.4, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-707", description: "CWE-707 Improper Neutralization -> CWE-74 Injection -> CWE-79 Cross Site Scripting", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-30T00:00:00.000Z", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { url: "https://vuldb.com/?id.214591", }, ], title: "SourceCodester Event Registration System cross site scripting", x_generator: "vuldb.com", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2022-4233", datePublished: "2022-11-30T00:00:00.000Z", dateReserved: "2022-11-30T00:00:00.000Z", dateUpdated: "2025-04-15T13:10:49.613Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-5120
Vulnerability from cvelistv5
Published
2024-05-20 06:00
Modified
2024-08-01 21:03
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
A vulnerability was found in SourceCodester Event Registration System 1.0. It has been classified as critical. Affected is an unknown function of the file /registrar/?page=registration. The manipulation of the argument e leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265200.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.265200 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.265200 | signature, permissions-required | |
https://vuldb.com/?submit.338614 | third-party-advisory | |
https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%203.md | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SourceCodester | Event Registration System |
Version: 1.0 |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:event_registration_system_project:event_registration_system:1.0:*:*:*:*:*:*:*", ], defaultStatus: "affected", product: "event_registration_system", vendor: "event_registration_system_project", versions: [ { status: "affected", version: "1.0", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-5120", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-05-20T13:32:43.325667Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-04T18:02:17.740Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:03:10.685Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "VDB-265200 | SourceCodester Event Registration System sql injection", tags: [ "vdb-entry", "technical-description", "x_transferred", ], url: "https://vuldb.com/?id.265200", }, { name: "VDB-265200 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", "x_transferred", ], url: "https://vuldb.com/?ctiid.265200", }, { name: "Submit #338614 | SourceCodester Event Registration System 1.0 SQL Injection", tags: [ "third-party-advisory", "x_transferred", ], url: "https://vuldb.com/?submit.338614", }, { tags: [ "exploit", "x_transferred", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%203.md", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Event Registration System", vendor: "SourceCodester", versions: [ { status: "affected", version: "1.0", }, ], }, ], credits: [ { lang: "en", type: "reporter", value: "Burak (VulDB User)", }, ], descriptions: [ { lang: "en", value: "A vulnerability was found in SourceCodester Event Registration System 1.0. It has been classified as critical. Affected is an unknown function of the file /registrar/?page=registration. The manipulation of the argument e leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265200.", }, { lang: "de", value: "Es wurde eine kritische Schwachstelle in SourceCodester Event Registration System 1.0 ausgemacht. Es betrifft eine unbekannte Funktion der Datei /registrar/?page=registration. Dank Manipulation des Arguments e mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.", }, ], metrics: [ { cvssV4_0: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", version: "4.0", }, }, { cvssV3_1: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, }, { cvssV3_0: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, { cvssV2_0: { baseScore: 6.5, vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-89", description: "CWE-89 SQL Injection", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-20T06:00:05.547Z", orgId: "1af790b2-7ee1-4545-860a-a788eba489b5", shortName: "VulDB", }, references: [ { name: "VDB-265200 | SourceCodester Event Registration System sql injection", tags: [ "vdb-entry", "technical-description", ], url: "https://vuldb.com/?id.265200", }, { name: "VDB-265200 | CTI Indicators (IOB, IOC, TTP, IOA)", tags: [ "signature", "permissions-required", ], url: "https://vuldb.com/?ctiid.265200", }, { name: "Submit #338614 | SourceCodester Event Registration System 1.0 SQL Injection", tags: [ "third-party-advisory", ], url: "https://vuldb.com/?submit.338614", }, { tags: [ "exploit", ], url: "https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%203.md", }, ], timeline: [ { lang: "en", time: "2024-05-19T00:00:00.000Z", value: "Advisory disclosed", }, { lang: "en", time: "2024-05-19T02:00:00.000Z", value: "VulDB entry created", }, { lang: "en", time: "2024-05-19T13:39:42.000Z", value: "VulDB entry last update", }, ], title: "SourceCodester Event Registration System sql injection", }, }, cveMetadata: { assignerOrgId: "1af790b2-7ee1-4545-860a-a788eba489b5", assignerShortName: "VulDB", cveId: "CVE-2024-5120", datePublished: "2024-05-20T06:00:05.547Z", dateReserved: "2024-05-19T11:34:24.125Z", dateUpdated: "2024-08-01T21:03:10.685Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }