Os4ed

Opensis

80 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.38%
  • Veröffentlicht 12.10.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:24:28

An SQL Injection vulnerability exists in openSIS Classic 8.0 via the 1) ADDR_CONT_USRN, 2) ADDR_CONT_PSWD, 3) SECN_CONT_USRN or 4) SECN_CONT_PSWD parameters in HoldAddressFields.php.

Exploit
  • EPSS 3.08%
  • Veröffentlicht 11.10.2021 19:15:07
  • Zuletzt bearbeitet 16.04.2025 15:15:46

An SQL Injection vulnerability exists in openSIS Community Edition version 8.0 via ForgotPassUserName.php.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 11.10.2021 13:15:07
  • Zuletzt bearbeitet 21.11.2024 06:24:21

Opensis-Classic Version 8.0 is affected by a SQL injection vulnerability due to a lack of sanitization of input data at two parameters $_GET['usrid'] and $_GET['prof_id'] in the PasswordCheck.php file.

Exploit
  • EPSS 25.26%
  • Veröffentlicht 11.10.2021 13:15:07
  • Zuletzt bearbeitet 21.11.2024 06:24:21

Opensis-Classic Version 8.0 is affected by cross-site scripting (XSS). An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php.

Exploit
  • EPSS 69.87%
  • Veröffentlicht 29.09.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:24:30

OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.

Exploit
  • EPSS 0.26%
  • Veröffentlicht 24.09.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:23:50

OpenSIS Community Edition version 8.0 is affected by a cross-site scripting (XSS) vulnerability in the TakeAttendance.php via the cp_id_miss_attn parameter.

Exploit
  • EPSS 1.24%
  • Veröffentlicht 24.09.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:23:50

A SQL injection vulnerability exists in the Take Attendance functionality of OS4Ed's OpenSIS 8.0. allows an attacker to inject their own SQL query. The cp_id_miss_attn parameter from TakeAttendance.php is vulnerable to SQL injection. An attacker can ...

  • EPSS 0.38%
  • Veröffentlicht 16.09.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:57:48

OpenSIS Community Edition version <= 7.6 is affected by a reflected XSS vulnerability in EmailCheck.php via the "opt" parameter.

  • EPSS 0.97%
  • Veröffentlicht 16.09.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:57:48

OpenSIS Community Edition version <= 7.6 is affected by a local file inclusion vulnerability in DownloadWindow.php via the "filename" parameter.

Exploit
  • EPSS 7%
  • Veröffentlicht 01.09.2021 13:15:08
  • Zuletzt bearbeitet 21.11.2024 06:19:27

A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the ResetUserInfo.php password_stn_id parameter.