A vulnerability was found in IP Reg up to 0.3. It has been rated as critical. Affected by this issue is some unknown functionality of the file locationdel.php. The manipulation of the argument vlan_id leads to sql injection.
This vulnerability is handled as CVE-2008-4606. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Micgr Mic Blog 0.0.3. Affected is an unknown function of the file category.php. The manipulation of the argument site leads to sql injection.
This vulnerability is traded as CVE-2008-6805. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Mosaic Commerce. Affected by this vulnerability is an unknown functionality of the file category.php. The manipulation of the argument cid leads to sql injection.
This vulnerability is known as CVE-2008-4599. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in CafeEngine Easycafeengine 1.1. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument itemid leads to sql injection.
This vulnerability is traded as CVE-2008-4604. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in CafeEngine Easycafeengine 1.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file dish.php. The manipulation of the argument id leads to sql injection.
This vulnerability is known as CVE-2008-4605. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Mywebland myEvent 1.6. Affected is an unknown function of the file viewevent.php. The manipulation of the argument eventdate leads to sql injection.
This vulnerability is traded as CVE-2008-4650. It is possible to launch the attack remotely. Furthermore, there is an exploit available.