CVE-2012-6626
Brian Cabunac Browser TO Email Phone Message System - SQL Injection
Title source: ruleDescription
SQL injection vulnerability in verify-user.php in b2ePMS 1.0 allows remote attackers to execute arbitrary SQL commands via the username field.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Jean Pascal Pereira · textwebappsphp
https://www.exploit-db.com/exploits/18882
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/53505
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/75568
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/18882
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/75569
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-05/0065.html
Scores
EPSS
0.0097
EPSS Percentile
76.7%
Details
CWE
CWE-89
Status
published
Products (1)
brian_cabunac/browser_to_email_phone_message_system
1.0
Published
Jan 16, 2014
Tracked Since
Feb 18, 2026