Filtered by vendor Online Examination System Project Subscriptions
Filtered by product Online Examination System Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-45111 1 Online Examination System Project 1 Online Examination System 2024-09-05 9.8 Critical
Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'email' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.
CVE-2020-29259 1 Online Examination System Project 1 Online Examination System 2024-08-04 5.4 Medium
Cross-site scripting (XSS) vulnerability in Online Examination System 1.0 via the subject or feedback parameter to feedback.php.
CVE-2020-29258 1 Online Examination System Project 1 Online Examination System 2024-08-04 6.1 Medium
Cross-site scripting (XSS) vulnerability in Online Examination System 1.0 via the w parameter to index.php.
CVE-2020-29257 1 Online Examination System Project 1 Online Examination System 2024-08-04 6.1 Medium
Cross-site scripting (XSS) vulnerability in Online Examination System 1.0 via the q parameter to feedback.php.
CVE-2020-26006 1 Online Examination System Project 1 Online Examination System 2024-08-04 6.1 Medium
Project Worlds Online Examination System 1.0 is affected by Cross Site Scripting (XSS) via account.php.
CVE-2020-25411 1 Online Examination System Project 1 Online Examination System 2024-08-04 6.5 Medium
Projectworlds Online Examination System 1.0 is vulnerable to CSRF, which allows a remote attacker to delete the existing user.
CVE-2023-36256 1 Online Examination System Project 1 Online Examination System 2024-08-02 6.5 Medium
The Online Examination System Project 1.0 version is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can craft a malicious link that, when clicked by an admin user, will delete a user account from the database without the admin's consent. The email of the user to be deleted is passed as a parameter in the URL, which can be manipulated by the attacker. This could result in a loss of data.