Simple Task Managing System SQL injection | CVE-2022-40032
NAME
__________
Simple Task Managing System SQL injection
Platforms Affected:
Risk Level:
7.3
Exploitability:
High
Consequences:
Data Manipulation
DESCRIPTION
__________
Simple Task Managing System is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the login.php script using the username and password parameters, which could allow the attacker to bypass authentication and obtain administrative access.
CVSS 3.0 Information
__________
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Access Vector:
Network
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon using the button below
![Simple Task Managing System SQL injection | CVE-2022-40032 1 Digital Patreon Wordmark FieryCoralv2](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/Digital-Patreon-Wordmark_FieryCoralv2-1024x209.png)
To keep up to date follow us on the below channels.
![Simple Task Managing System SQL injection | CVE-2022-40032 2 join](https://www.redpacketsecurity.com/wp-content/uploads/2022/06/join.png)
![Simple Task Managing System SQL injection | CVE-2022-40032 3 discord](https://www.redpacketsecurity.com/wp-content/uploads/2022/06/discord.png)
![Simple Task Managing System SQL injection | CVE-2022-40032 4 reddit](https://www.redpacketsecurity.com/wp-content/uploads/2022/06/reddit-2000x690.png)
![Simple Task Managing System SQL injection | CVE-2022-40032 5 hd linkedin](https://www.redpacketsecurity.com/wp-content/uploads/2022/08/hd-linkedin.webp)