| Kura | Engeman Engeman Web <= 12.0.0.1 SQL Injection |
|---|
| Gaskiya | A vulnerability that allows manipulation of the SQL query made during the password recovery page load was found in the Engeman Web software. This vulnerability can be exploited by visitors without access to any valid credentials, that is, in an unauthenticated manner, to compromise the confidentiality and integrity of the data stored in the application's database, as well as potentially cause denial of service at the component level by altering values in critical tables. |
|---|
| Manga | ⚠️ https://docs.google.com/document/d/1fbe1o3ncvmYbw-w1MKMUJg7z-qu1Wyo81y9isFlNyi0/edit?usp=sharing |
|---|
| Màdùmga | m3m0o (UID 87980) |
|---|
| Furta | 07/16/2025 05:29 (7 Wurɗi 전) |
|---|
| Gargajiya | 07/26/2025 10:58 (10 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 317808 [Engeman Web har 12.0.0.2 Password Recovery Page /Login/RecoveryPass LanguageCombobox SQL Injection] |
|---|
| Nganji | 20 |
|---|