The provided text describes SQL injection vulnerabilities in ClipBucket 1.7.1 due to insufficient input sanitization. Example payloads are given for parameters like 'userid', 'username', and 'session'.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Theoretical
Target:ClipBucket 1.7.1
No auth needed
Prerequisites:Access to vulnerable parameters in ClipBucket