Page 2 of 30 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=quotes/view_quote&id=. Sanitization Management System v1.0 es vulnerable a la inyección SQL a través de /php-sms/admin/?page=quotes/view_quote&id=. • https://github.com/BGP-OSPF/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-1.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/classes/Master.php?f=delete_product. Sanitization Management System v1.0 es vulnerable a la inyección SQL a través de /php-sms/classes/Master.php?f=delete_product. • https://github.com/llwyx200113/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-1.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Sanitization Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel. Se descubrió que Sanitization Management System v1.0 contiene credenciales codificadas que permiten a los atacantes escalar privilegios y acceder al panel de administración. • https://github.com/upasvi/CVE-/issues/1 • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/manage_service&id=. Sanitization Management System v1.0 es vulnerable a la inyección SQL a través de /php-sms/admin/?page=services/manage_service&id=. • https://github.com/Distance10086/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-3.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/quotes/manage_remark.php?id=. Sanitization Management System v1.0 es vulnerable a la inyección SQL a través de /php-sms/admin/quotes/manage_remark.php?id=. • https://github.com/Distance10086/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-2.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •