CVE-2021-44600

The password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:simple_online_men\'s_salon_management_system:1.0:*:*:*:*:*:*:*

History

11 Feb 2025, 15:25

Type Values Removed Values Added
First Time Oretnom23 simple Online Men\'s Salon Management System
Oretnom23
CPE cpe:2.3:a:online_mens_salon_management_system_project:online_mens_salon_management_system:1.0:*:*:*:*:*:*:* cpe:2.3:a:oretnom23:simple_online_men\'s_salon_management_system:1.0:*:*:*:*:*:*:*

21 Nov 2024, 06:31

Type Values Removed Values Added
References () https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMSĀ - Exploit, Third Party Advisory () https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/MSMSĀ - Exploit, Third Party Advisory

Information

Published : 2021-12-23 14:15

Updated : 2025-02-11 15:25


NVD link : CVE-2021-44600

Mitre link : CVE-2021-44600

CVE.ORG link : CVE-2021-44600


JSON object : View

Products Affected

oretnom23

  • simple_online_men\'s_salon_management_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')