CVE-2012-6626

Brian Cabunac Browser TO Email Phone Message System - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in verify-user.php in b2ePMS 1.0 allows remote attackers to execute arbitrary SQL commands via the username field.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Jean Pascal Pereira · textwebappsphp
https://www.exploit-db.com/exploits/18882

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/53505
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/75568
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/18882
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/75569
Exploit mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-05/0065.html

Scores

EPSS 0.0097
EPSS Percentile 76.7%

Details

CWE
CWE-89
Status published
Products (1)
brian_cabunac/browser_to_email_phone_message_system 1.0
Published Jan 16, 2014
Tracked Since Feb 18, 2026