Zero-day Vulnerability Database

Change view:

Zero-day vulnerabilities discovered: 1

SQL injection in PJHome PJBlog3

SQL injection

The vulnerability allows a remote attacker to inject SQL commands on the target system.

The weakness exists in the checkAlias action when processing malformed data passed via "cname" parameter. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL queries in web application database..

Successful exploitation of the vulnerability results in compromise of vulnerable system.

Note: this vulnerability was being actively exploited.

Software: PJBlog3

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.