Security for everyone

CVE-2018-7282 Scanner

Detects 'SQL Injection (SQLi)' vulnerability in TITool PrintMonitor affects v. before PM18.2.1.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2018-7282 Scanner Detail

The TITool PrintMonitor is a software solution that is commonly used to monitor printing activities in organizations. It allows companies to keep track of the printing outputs of their employees and ensure that no sensitive information is being printed without proper authorization. This software is typically installed on a server and can be accessed and controlled by system administrators through a web-based interface.

Unfortunately, the TITool PrintMonitor was found to contain a potentially dangerous vulnerability - the CVE-2018-7282 vulnerability. This vulnerability relates to the username parameter of the software's login request and leaves it vulnerable to SQL injection and time-based blind SQL attacks. Essentially, an attacker who exploits this vulnerability can access and manipulate data stored within the application's database without proper authorization—that's terrifying.

If exploited, the CVE-2018-7282 vulnerability can lead to a series of grave consequences for a company. An attacker can easily gain access to sensitive information, steal data, distribute malware, and cause irreversible damage to an organization's reputation and finances. This vulnerability can cause havoc, and it must be addressed immediately to ensure that the software is secure and reliable.

In conclusion, by leveraging the robust pro-level features of platform, organizations can easily and quickly learn about vulnerabilities in their digital assets. The platform offers cutting-edge security insights and alerts, expert advice, and practical recommendations to secure digital assets from the growing threats of cyber attacks. By working together to address vulnerability like CVE-2018-7282, we can enhance the overall security and safety of digital assets.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture