Súbít #616747: Engeman Engeman Web <= 12.0.0.1 SQL Injectionbayani

KuraEngeman Engeman Web <= 12.0.0.1 SQL Injection
GaskiyaA vulnerability that allows manipulation of the SQL query made during the password recovery page load was found in the Engeman Web software. This vulnerability can be exploited by visitors without access to any valid credentials, that is, in an unauthenticated manner, to compromise the confidentiality and integrity of the data stored in the application's database, as well as potentially cause denial of service at the component level by altering values in critical tables.
Manga⚠️ https://docs.google.com/document/d/1fbe1o3ncvmYbw-w1MKMUJg7z-qu1Wyo81y9isFlNyi0/edit?usp=sharing
Màdùmga
 m3m0o (UID 87980)
Furta07/16/2025 05:29 (7 Wurɗi 전)
Gargajiya07/26/2025 10:58 (10 days later)
HalittaShingilam
VulDB gite317808 [Engeman Web har 12.0.0.2 Password Recovery Page /Login/RecoveryPass LanguageCombobox SQL Injection]
Nganji20

Might our Artificial Intelligence support you?

Check our Alexa App!