The BerliOS SourceWell application is prone to an SQL injection vulnerability. This vulnerability occurs when user-supplied input is not properly sanitized before being used in an SQL query. An attacker can exploit this vulnerability to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.
Softbiz Resource Repository Script is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
The Nelogic Nephp Publisher application is prone to SQL injection vulnerabilities. These vulnerabilities occur due to a lack of proper sanitization of user-supplied input before using it in an SQL query. An attacker can exploit these vulnerabilities to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.
Bedeng PSP is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
Bedeng PSP is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
PHPWordPress is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
The Top Music Module for PHP-Nuke is prone to SQL injection vulnerabilities. These vulnerabilities occur when user-supplied input is not properly sanitized before being used in SQL queries. An attacker can exploit these vulnerabilities by injecting malicious SQL code into the 'idartist' and 'idsong' parameters in the '/modules.php?name=topMusic' URL. Successful exploitation could lead to compromise of the application, disclosure or modification of data, or exploitation of vulnerabilities in the underlying database implementation.
Babe Logger is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
The Enterprise Connector application is prone to SQL injection vulnerabilities. These vulnerabilities occur when the application fails to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by sending a specially crafted request to the '/send.php' endpoint with a malicious SQL payload in the 'messageid' parameter. Successful exploitation of this vulnerability could lead to compromise of the application, disclosure or modification of data, or allow the attacker to exploit vulnerabilities in the underlying database implementation.
The 'unalz' utility is prone to a buffer-overflow vulnerability. This issue is exposed when the application extracts an ALZ archive that contains a file with a long name. An attacker could exploit this vulnerability to execute arbitrary code in the context of the user who extracts a malicious archive.