Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Supersmart\.me_\-_walk_through
(Supersmart)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-07-21 | CVE-2022-30628 | It was possible to download all receipts without authentication. Must first access the API https://XXXX.supersmart.me/services/v4/customer/signin to get a TOKEN. Then you can then access the API that provides invoice images based on the URL https://XXXX.supersmart.me/services/v4/invoiceImg?orderId=XXXXX | Supersmart\.me_\-_walk_through | 5.5 | ||
2022-08-05 | CVE-2022-34768 | insert HTML / js code inside input how to get to the vulnerable input : Workers > worker nickname > inject in this input the code. | Supersmart\.me_\-_walk_through | 7.5 |