Vulnerabilities (CVE)

Filtered by vendor Simple Cold Storage Management System Project Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-3547 1 Simple Cold Storage Management System Project 1 Simple Cold Storage Management System 2024-02-28 N/A 4.8 MEDIUM
A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /csms/admin/?page=system_info of the component Setting Handler. The manipulation of the argument System Name/System Short Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-211047.
CVE-2022-42230 1 Simple Cold Storage Management System Project 1 Simple Cold Storage Managment System 2024-02-28 N/A 7.2 HIGH
Simple Cold Storage Management System v1.0 is vulnerable to SQL Injection via /csms/admin/?page=user/manage_user&id=.
CVE-2022-43230 1 Simple Cold Storage Management System Project 1 Simple Cold Storage Managment System 2024-02-28 N/A 7.2 HIGH
Simple Cold Storage Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=bookings/view_details.
CVE-2022-43229 1 Simple Cold Storage Management System Project 1 Simple Cold Storage Managment System 2024-02-28 N/A 7.2 HIGH
Simple Cold Storage Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /bookings/update_status.php.
CVE-2021-45253 1 Simple Cold Storage Management System Project 1 Simple Cold Storage Managment System 2024-02-28 7.5 HIGH 9.8 CRITICAL
The id parameter in view_storage.php from Simple Cold Storage Management System 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.