Vulnerability Description
Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Simple Task Scheduling System Project | Simple Task Scheduling System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-task-schExploitThird Party Advisory
- https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-task-schExploitThird Party Advisory
FAQ
What is CVE-2022-36679?
CVE-2022-36679 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user.
How severe is CVE-2022-36679?
CVE-2022-36679 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-36679?
Check the references section above for vendor advisories and patch information. Affected products include: Simple Task Scheduling System Project Simple Task Scheduling System.