The ShockBoard application is prone to an SQL injection vulnerability. This vulnerability occurs due to a failure in the application's input sanitization process, allowing an attacker to inject malicious SQL code into the 'offset' parameter of the '/topic.php' page. Successful exploitation of this vulnerability can lead to various security consequences, including compromising the application, unauthorized disclosure or modification of data, and exploitation of vulnerabilities in the underlying database implementation.
edmoBBS is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
Multiple vulnerabilities in Kasseler CMS allow for SQL injection, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF) attacks. The SQL injection vulnerability (CVE-2013-3727) allows remote authenticated administrators to execute arbitrary SQL commands. The XSS vulnerability can be exploited by tricking a logged-in administrator to visit a webpage with a CSRF exploit. The CSRF vulnerability can be used to perform DNS exfiltration on a Windows platform.
The vulnerability allows an attacker to inject user specified HTML code and execute local commands in the Mobile Atlas Creator application.
K-Search is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
AllWeb Search is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
The BerliOS SourceWell application is prone to an SQL injection vulnerability. This vulnerability occurs when user-supplied input is not properly sanitized before being used in an SQL query. An attacker can exploit this vulnerability to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.
Softbiz Resource Repository Script is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
The Nelogic Nephp Publisher application is prone to SQL injection vulnerabilities. These vulnerabilities occur due to a lack of proper sanitization of user-supplied input before using it in an SQL query. An attacker can exploit these vulnerabilities to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.
Bedeng PSP is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.