CVE-2022-40032

SQL Injection vulnerability in Simple Task Managing System version 1.0 in login.php in 'username' and 'password' parameters, allows attackers to execute arbitrary code and gain sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:simple_task_managing_system_project:simple_task_managing_system:1.0:*:*:*:*:*:*:*

History

06 Apr 2023, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/171739/Simple-Task-Managing-System-1.0-SQL-Injection.html -

25 Feb 2023, 04:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-89
First Time Simple Task Managing System Project
Simple Task Managing System Project simple Task Managing System
CPE cpe:2.3:a:simple_task_managing_system_project:simple_task_managing_system:1.0:*:*:*:*:*:*:*
References (MISC) https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated - (MISC) https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated - Exploit, Third Party Advisory
References (MISC) https://www.sourcecodester.com/php/15624/simple-task-managing-system-php-mysqli-free-source-code.html - (MISC) https://www.sourcecodester.com/php/15624/simple-task-managing-system-php-mysqli-free-source-code.html - Product
References (MISC) https://www.sourcecodester.com/sites/default/files/download/razormist/Task%20Managing%20System%20in%20PHP.zip - (MISC) https://www.sourcecodester.com/sites/default/files/download/razormist/Task%20Managing%20System%20in%20PHP.zip - Product

17 Feb 2023, 14:21

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-17 14:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-40032

Mitre link : CVE-2022-40032

CVE.ORG link : CVE-2022-40032


JSON object : View

Products Affected

simple_task_managing_system_project

  • simple_task_managing_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')