From dced04fd39186048d3720976d53faba4d04ef233 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Thu, 20 Oct 2022 12:45:34 +0530 Subject: [PATCH] Update aerocms-sqli.yaml --- vulnerabilities/other/aerocms-sqli.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/vulnerabilities/other/aerocms-sqli.yaml b/vulnerabilities/other/aerocms-sqli.yaml index 398959e79a..e87d267ac5 100644 --- a/vulnerabilities/other/aerocms-sqli.yaml +++ b/vulnerabilities/other/aerocms-sqli.yaml @@ -8,6 +8,7 @@ info: The `author` parameter from the AeroCMS-v0.0.1 CMS system appears to be vulnerable to SQL injection attacks.The malicious user can dump-steal the database, from this CMS system and he can use it for very malicious purposes. reference: - https://www.exploit-db.com/exploits/51022 + - https://github.com/MegaTKC/AeroCMS/releases/tag/v0.0.1 metadata: verified: true tags: aero,cms,sqli