Summary
Detail | |||
---|---|---|---|
Vendor | Picturethiswebserver Project | First view | 2023-01-16 |
Product | Picturethiswebserver | Last view | 2023-01-16 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:picturethiswebserver_project:picturethiswebserver:*:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2023-01-16 | CVE-2015-10055 | A vulnerability was found in PictureThisWebServer and classified as critical. This issue affects the function router.post of the file routes/user.js. The manipulation of the argument username/password leads to sql injection. The patch is named 68b9dc346e88b494df00d88c7d058e96820e1479. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218399. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |