Oretnom23 Vulnerabilities
Comprehensive security vulnerability database for Oretnom23 products
4
11
8
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-26886 | 2.7 | This vulnerability allows an attacker to manipulate the database of the online men's salon management system by injecting malicious SQL code through the admin service management page. To exploit this, the attacker needs access to the admin panel, which may require valid login credentials. | oretnom23simple online men\'s salon management system | Theoretical | about 1 month agoMar 3, 2026 |
| CVE-2026-26885 | 2.7 | This vulnerability allows an attacker to manipulate the database of a men's salon management system by injecting harmful SQL commands through a specific URL. To exploit it, the attacker needs to access the system's delete service function, which could lead to unauthorized data deletion or exposure. | oretnom23simple online men\'s salon management system | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2026-26884 | 2.7 | This vulnerability allows an attacker to manipulate the database of a men's salon management system by injecting harmful SQL commands through a specific page. To exploit this, the attacker needs access to the web application and must target the appointments viewing feature. | oretnom23simple online men\'s salon management system | Theoretical | about 1 month agoMar 3, 2026 |
| CVE-2026-26883 | 2.7 | This vulnerability allows an attacker to manipulate the database of a men's salon management system by sending specially crafted requests to delete appointments. To exploit this, the attacker needs access to the specific URL that handles appointment deletions, which could lead to unauthorized data removal or other malicious actions. | oretnom23simple online men\'s salon management system | Theoretical | about 1 month agoMar 3, 2026 |
About Oretnom23 Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Oretnom23 products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.