Security for everyone

CVE-2020-22208 Scanner

Detects 'SQL Injection' vulnerability in 74 CMS affects v. 3.2.0.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2020-22208 Scanner Detail

74 CMS is a Content Management System used for creating and managing websites. It is designed to be user-friendly, with a range of features to help businesses and individuals build an online presence. The CMS allows users to easily add and manage pages, upload and categorize media files, and customize the look and feel of their site. It also includes powerful search engine optimization tools and support for e-commerce websites.

Recently, however, a vulnerability in the system was detected that has raised concerns about its security. CVE-2020-22208 is a SQL injection vulnerability that can be exploited through the x parameter to plus/ajax_street.php. This flaw allows an attacker to execute arbitrary SQL commands, giving them access to sensitive information stored in the database. 

If left unpatched, the CVE-2020-22208 vulnerability can cause serious damage to a website. An attacker could potentially steal login credentials, financial data, or personal information of website users. They could also modify, delete, or add content to the site, causing reputational damage and undermining the organization's credibility. In extreme cases, the vulnerability could allow an attacker to take control of the entire website, using it to launch further attacks on other systems.

At, we provide a range of pro features to help individuals and businesses stay informed about vulnerabilities in their digital assets. Our platform offers real-time vulnerability scanning, 24/7 monitoring, and actionable insights to help users identify and remediate security gaps quickly and effectively. With our help, you can rest assured that your website and other digital assets are protected from the latest threats and vulnerabilities.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture