SQL Injection vulnerability in Simple Task Managing System version 1.0 in login.php in 'username' and 'password' parameters, allows attackers to execute arbitrary code and gain sensitive information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/171739/Simple-Task-Managing-System-1.0-SQL-Injection.html - | |
References | () https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated - Exploit, Third Party Advisory | |
References | () https://www.sourcecodester.com/php/15624/simple-task-managing-system-php-mysqli-free-source-code.html - Product | |
References | () https://www.sourcecodester.com/sites/default/files/download/razormist/Task%20Managing%20System%20in%20PHP.zip - Product | |
Summary |
|
25 Feb 2023, 04:54
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-17 14:15
Updated : 2024-11-21 07:20
NVD link : CVE-2022-40032
Mitre link : CVE-2022-40032
CVE.ORG link : CVE-2022-40032
JSON object : View
Products Affected
simple_task_managing_system_project
- simple_task_managing_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')