The password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMS | Exploit Third Party Advisory |
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMS | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
11 Feb 2025, 15:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oretnom23:simple_online_men\'s_salon_management_system:1.0:*:*:*:*:*:*:* | |
First Time |
Oretnom23
Oretnom23 simple Online Men\'s Salon Management System |
Information
Published : 2021-12-23 14:15
Updated : 2025-02-11 15:25
NVD link : CVE-2021-44600
Mitre link : CVE-2021-44600
CVE.ORG link : CVE-2021-44600
JSON object : View
Products Affected
oretnom23
- simple_online_men\'s_salon_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')