SQL injection vulnerability in Gender MOD 1.1.3 allows remote attackers to gain administrative access via the user_level parameter in the User Profile page.
Max CVSS
10.0
EPSS Score
0.16%
Published
2002-12-31
Updated
2008-09-05
SQL injection vulnerability in ASP Client Check (ASPCC) 1.3 and 1.5 allows remote attackers to bypass authentication and gain unauthorized access via the password field.
Max CVSS
10.0
EPSS Score
0.29%
Published
2002-12-31
Updated
2017-07-11
Multiple SQL injection vulnerabilities in Mantis 0.17.2 and earlier, when running without magic_quotes_gpc enabled, allows remote attackers to gain privileges or perform unauthorized database operations via modified form fields, e.g. to account_update.php.
Max CVSS
10.0
EPSS Score
0.28%
Published
2002-10-04
Updated
2016-10-18
SQL injection vulnerability in Ruslan <Body>Builder allows remote attackers to gain administrative privileges via a "'--" sequence in the username and password.
Max CVSS
10.0
EPSS Score
0.22%
Published
2002-10-04
Updated
2008-09-05
Demarc PureSecure 1.05 allows remote attackers to gain administrative privileges via a SQL injection attack in a session ID that is stored in the s_key cookie.
Max CVSS
10.0
EPSS Score
0.45%
Published
2002-07-03
Updated
2008-09-05
admin.asp in AdMentor 2.11 allows remote attackers to bypass authentication and gain privileges via a SQL injection attack on the Login and Password arguments.
Max CVSS
10.0
EPSS Score
0.32%
Published
2002-05-31
Updated
2017-07-11
pforum 1.14 and earlier does not explicitly enable PHP magic quotes, which allows remote attackers to bypass authentication and gain administrator privileges via an SQL injection attack when the PHP server is not configured to use magic quotes by default.
Max CVSS
10.0
EPSS Score
0.19%
Published
2002-05-31
Updated
2016-10-18
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!