Filtered by vendor Os4ed
Subscriptions
Total
65 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-27041 | 1 Os4ed | 1 Opensis | 2022-04-15 | 7.5 High |
Due to lack of protection, parameter student_id in OpenSIS Classic 8.0 /modules/eligibility/Student.php can be used to inject SQL queries to extract information from databases. | ||||
CVE-2021-40635 | 1 Os4ed | 1 Opensis | 2022-03-09 | 7.5 High |
OS4ED openSIS 8.0 is affected by SQL injection in ChooseCpSearch.php, ChooseRequestSearch.php. An attacker can inject a SQL query to extract information from the database. | ||||
CVE-2021-40636 | 1 Os4ed | 1 Opensis | 2022-03-09 | 7.5 High |
OS4ED openSIS 8.0 is affected by SQL Injection in CheckDuplicateName.php, which can extract information from the database. | ||||
CVE-2021-40637 | 1 Os4ed | 1 Opensis | 2022-03-09 | 6.1 Medium |
OS4ED openSIS 8.0 is affected by cross-site scripting (XSS) in EmailCheckOthers.php. An attacker can inject JavaScript code to get the user's cookie and take over the working session of user. | ||||
CVE-2021-41678 | 1 Os4ed | 1 Opensis | 2021-11-30 | 9.8 Critical |
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/users/Staff.php, staff{TITLE] parameter. | ||||
CVE-2021-41679 | 1 Os4ed | 1 Opensis | 2021-11-30 | 9.8 Critical |
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter. | ||||
CVE-2021-41677 | 1 Os4ed | 1 Opensis | 2021-11-30 | 9.8 Critical |
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/functions/GetStuListFnc.php &Grade= parameter. | ||||
CVE-2021-40618 | 1 Os4ed | 1 Opensis | 2021-10-19 | 9.8 Critical |
An SQL Injection vulnerability exists in openSIS Classic 8.0 via the 1) ADDR_CONT_USRN, 2) ADDR_CONT_PSWD, 3) SECN_CONT_USRN or 4) SECN_CONT_PSWD parameters in HoldAddressFields.php. | ||||
CVE-2021-40617 | 1 Os4ed | 1 Opensis | 2021-10-19 | 9.8 Critical |
An SQL Injection vulnerability exists in openSIS Community Edition version 8.0 via ForgotPassUserName.php. | ||||
CVE-2021-40543 | 1 Os4ed | 1 Opensis | 2021-10-18 | 9.8 Critical |
Opensis-Classic Version 8.0 is affected by a SQL injection vulnerability due to a lack of sanitization of input data at two parameters $_GET['usrid'] and $_GET['prof_id'] in the PasswordCheck.php file. | ||||
CVE-2021-40542 | 1 Os4ed | 1 Opensis | 2021-10-18 | 6.1 Medium |
Opensis-Classic Version 8.0 is affected by cross-site scripting (XSS). An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php. | ||||
CVE-2021-40651 | 1 Os4ed | 1 Opensis | 2021-10-07 | 6.5 Medium |
OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file. | ||||
CVE-2021-40309 | 1 Os4ed | 1 Opensis | 2021-10-01 | 8.8 High |
A SQL injection vulnerability exists in the Take Attendance functionality of OS4Ed's OpenSIS 8.0. allows an attacker to inject their own SQL query. The cp_id_miss_attn parameter from TakeAttendance.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request as a user with access to "Take Attendance" functionality to trigger this vulnerability. | ||||
CVE-2021-40310 | 1 Os4ed | 1 Opensis | 2021-09-30 | 5.4 Medium |
OpenSIS Community Edition version 8.0 is affected by a cross-site scripting (XSS) vulnerability in the TakeAttendance.php via the cp_id_miss_attn parameter. | ||||
CVE-2021-27341 | 1 Os4ed | 1 Opensis | 2021-09-27 | 9.8 Critical |
OpenSIS Community Edition version <= 7.6 is affected by a local file inclusion vulnerability in DownloadWindow.php via the "filename" parameter. | ||||
CVE-2021-27340 | 1 Os4ed | 1 Opensis | 2021-09-27 | 6.1 Medium |
OpenSIS Community Edition version <= 7.6 is affected by a reflected XSS vulnerability in EmailCheck.php via the "opt" parameter. | ||||
CVE-2021-39378 | 1 Os4ed | 1 Opensis | 2021-09-16 | 9.8 Critical |
A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the NamesList.php str parameter. | ||||
CVE-2021-39377 | 1 Os4ed | 1 Opensis | 2021-09-09 | 9.8 Critical |
A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the index.php username parameter. | ||||
CVE-2021-39379 | 1 Os4ed | 1 Opensis | 2021-09-09 | 9.8 Critical |
A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the ResetUserInfo.php password_stn_id parameter. | ||||
CVE-2021-40353 | 1 Os4ed | 1 Opensis | 2021-09-09 | 9.8 Critical |
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the index.php USERNAME parameter. NOTE: this issue may exist because of an incomplete fix for CVE-2020-6637. |