Victor CMS version 1.0 contains a SQL injection vulnerability in the 'post' parameter on post.php that allows remote attackers to manipulate database queries. Attackers can exploit this vulnerability by sending crafted UNION SELECT payloads to extract database information through boolean-based, error-based, and time-based injection techniques.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Victoralagwu
Victoralagwu cmssite |
|
| Vendors & Products |
Victoralagwu
Victoralagwu cmssite |
Tue, 03 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Victor CMS version 1.0 contains a SQL injection vulnerability in the 'post' parameter on post.php that allows remote attackers to manipulate database queries. Attackers can exploit this vulnerability by sending crafted UNION SELECT payloads to extract database information through boolean-based, error-based, and time-based injection techniques. | |
| Title | Victor CMS 1.0 - 'post' SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-03T22:01:43.785Z
Reserved: 2026-02-01T13:16:06.485Z
Link: CVE-2020-37076
No data.
Status : Received
Published: 2026-02-03T22:16:23.133
Modified: 2026-02-03T22:16:23.133
Link: CVE-2020-37076
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:05:28Z
Weaknesses