"value":"Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the\u00a0'eventdate' and 'events' parameters in 'port/event_print.php'."
"value":"Vulnerabilidad de Cross-Site Scripting (XSS) en School Event Management System que afecta a la versi\u00f3n 1.0. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un payload de JavaScript especialmente manipulado a un usuario autenticado y tomar parcialmente el control de su sesi\u00f3n del navegador a trav\u00e9s de los par\u00e1metros 'eventdate' y 'events' en 'port/event_print.php'."