Filtered by vendor Sourcecodester Subscriptions
Filtered by product Yoga Class Registration System Subscriptions
Total 4 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-7851 2 Oretnom23, Sourcecodester 2 Yoga Class Registration System, Yoga Class Registration System 2024-09-03 6.3 Medium
A vulnerability has been found in SourceCodester Yoga Class Registration System 1.0 and classified as critical. This vulnerability affects unknown code of the file /classes/Users.php?f=save of the component Add User Handler. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-7853 2 Oretnom23, Sourcecodester 2 Yoga Class Registration System, Yoga Class Registration System 2024-09-03 6.3 Medium
A vulnerability was found in SourceCodester Yoga Class Registration System up to 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=categories/view_category. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-7852 2 Oretnom23, Sourcecodester 2 Yoga Class Registration System, Yoga Class Registration System 2024-08-29 3.5 Low
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-7914 2 Oretnom23, Sourcecodester 2 Yoga Class Registration System, Yoga Class Registration System 2024-08-19 3.5 Low
A vulnerability classified as problematic has been found in SourceCodester Yoga Class Registration System 1.0. Affected is an unknown function of the file /php-ycrs/classes/SystemSettings.php. The manipulation of the argument address leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.