📦 Ehrd Ctms
by Sun.net
🔍 What is Ehrd Ctms?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A SQL injection vulnerability in SUNNET Corporate Training Management System allows remote attackers to execute arbitrary SQL commands. This could lead to data theft, system compromise, or complete da...
This vulnerability allows remote attackers to upload malicious files to SUNNET Corporate Training Management System, potentially leading to arbitrary code execution. It affects all systems running ver...
This vulnerability allows remote attackers to access deployment functionality in SUNNET Corporate Training Management System without authentication. Attackers can potentially deploy malicious code or ...
The eHDR CTMS from Sunnet contains a SQL injection vulnerability that allows unauthenticated remote attackers to execute arbitrary SQL commands. This enables attackers to read, modify, or delete datab...
The eHRD CTMS from Sunnet has an authentication bypass vulnerability that allows unauthenticated remote attackers to access restricted functionalities without valid credentials. Organizations using Su...
SUNNET CTMS has a path traversal vulnerability in its file upload function that allows authenticated users to upload and execute scripts in arbitrary directories. This enables remote code execution an...
This is a reflected cross-site scripting (XSS) vulnerability in Sunnet's eHRD software that allows unauthenticated attackers to execute arbitrary JavaScript in users' browsers through phishing attacks...
Sunnet eHRD software contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript in users' browsers through phishing links. This affec...
This is a reflected cross-site scripting (XSS) vulnerability in Sunnet's eHRD software that allows unauthenticated attackers to execute arbitrary JavaScript in users' browsers through phishing attacks...
The eHDR CTMS from Sunnet contains a SQL injection vulnerability that allows authenticated users with regular privileges to execute arbitrary SQL commands and read database contents. This affects orga...