Description
Multiple SQL injection vulnerabilities in LINK Content Management Server (CMS) allow remote attackers to execute arbitrary SQL commands via the (1) IDMeniGlavni parameter to navigacija.php, and the (2) IDStranicaPodaci parameter to prikazInformacije.php. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Ivan Markovic · textwebappsphp
https://www.exploit-db.com/exploits/29233
exploitdb
WRITEUP
VERIFIED
by Ivan Markovic · textwebappsphp
https://www.exploit-db.com/exploits/29232
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/21464
Exploit third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23107
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/30744
Scores
EPSS
0.0034
EPSS Percentile
56.8%
Details
Status
published
Products (1)
link_content_management_server/link_content_management_server
Published
Dec 08, 2006
Tracked Since
Feb 18, 2026