Description
A vulnerability classified as critical has been found in Microfinance Management System. The manipulation of arguments like customer_type_number/account_number/account_status_number/account_type_number with the input ' and (select * from(select(sleep(10)))Avx) and 'abc' = 'abc leads to sql injection in multiple files. It is possible to launch the attack remotely.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24427 | A vulnerability classified as critical has been found in Microfinance Management System. The manipulation of arguments like customer_type_number/account_number/account_status_number/account_type_number with the input ' and (select * from(select(sleep(10)))Avx) and 'abc' = 'abc leads to sql injection in multiple files. It is possible to launch the attack remotely. |
References
| Link | Providers |
|---|---|
| https://vuldb.com/?id.195642 |
|
History
Tue, 15 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-04-15T14:43:30.836Z
Reserved: 2022-03-25T00:00:00.000Z
Link: CVE-2022-1083
Updated: 2024-08-02T23:47:43.297Z
Status : Modified
Published: 2022-03-29T06:15:07.987
Modified: 2024-11-21T06:39:59.873
Link: CVE-2022-1083
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD