Description
SQL injection vulnerability in headeruserdata.php in Visual Shapers ezContents 2.0.3 allows remote attackers to execute arbitrary SQL commands via the groupname parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by DarkFig · textwebappsphp
https://www.exploit-db.com/exploits/28464
References (8)
Core 8
Core References
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/1479
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1016770
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3420
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28320
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/28675
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21703
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/19777
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/444779/100/0/threaded
Scores
EPSS
0.0173
EPSS Percentile
82.5%
Details
Status
published
Products (1)
visualshapers/ezcontents
2.0.3
Published
Aug 31, 2006
Tracked Since
Feb 18, 2026