📦 Online Beauty Parlor Management System
by Campcodes
🔍 What is Online Beauty Parlor Management System?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This SQL injection vulnerability in Campcodes Online Beauty Parlor Management System 1.0 allows attackers to manipulate database queries through the 'sername' parameter in /admin/manage-services.php. ...
This vulnerability allows remote attackers to execute arbitrary SQL commands through the viewid parameter in the /admin/view-appointment.php file of Campcodes Online Beauty Parlor Management System 1....
Campcodes Online Beauty Parlor Management System 1.0 contains a SQL injection vulnerability in the /admin/sales-reports-detail.php file through the fromdate/todate parameters. This allows remote attac...
This SQL injection vulnerability in Campcodes Online Beauty Parlor Management System 1.0 allows attackers to manipulate database queries through the fromdate/todate parameters in the admin interface. ...
This SQL injection vulnerability in Campcodes Online Beauty Parlor Management System 1.0 allows attackers to manipulate database queries through the editid parameter in /admin/edit-customer-detailed.p...
This SQL injection vulnerability in Campcodes Online Beauty Parlor Management System 1.0 allows attackers to manipulate database queries through the mobilenum parameter in the /admin/add-customer.php ...
This SQL injection vulnerability in Campcodes Online Beauty Parlor Management System 1.0 allows attackers to manipulate database queries through the 'sername' parameter in /admin/add-services.php. Org...
This vulnerability allows attackers to inject malicious scripts into the Campcodes Complete Online Beauty Parlor Management System 1.0 through the searchdata parameter in /admin/search-invoices.php. W...
This vulnerability allows attackers to inject malicious scripts into the Campcodes Complete Online Beauty Parlor Management System 1.0 via the Name parameter in the customer-list.php admin page. When ...