source: http://www.securityfocus.com/bid/18713/info
The 'phpclassifieds.info' product is prone to multiple input-validation vulnerabilities. The issues include HTML- and SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
Successful exploits of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, control how the site is rendered to the user, or exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
http://www.example.com/search.php?rate=[sql]
{"id": "EDB-ID:28125", "type": "exploitdb", "bulletinFamily": "exploit", "title": "PHPClassifieds.Info Multiple Input Validation Vulnerabilities", "description": "PHPClassifieds.Info Multiple Input Validation Vulnerabilities. CVE-2006-3329. Webapps exploit for php platform", "published": "2006-06-28T00:00:00", "modified": "2006-06-28T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.exploit-db.com/exploits/28125/", "reporter": "Luny", "references": [], "cvelist": ["CVE-2006-3329"], "lastseen": "2016-02-03T07:28:38", "viewCount": 2, "enchantments": {"score": {"value": 6.8, "vector": "NONE", "modified": "2016-02-03T07:28:38", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-3329"]}, {"type": "osvdb", "idList": ["OSVDB:26923"]}], "modified": "2016-02-03T07:28:38", "rev": 2}, "vulnersScore": 6.8}, "sourceHref": "https://www.exploit-db.com/download/28125/", "sourceData": "source: http://www.securityfocus.com/bid/18713/info\r\n\r\nThe 'phpclassifieds.info' product is prone to multiple input-validation vulnerabilities. The issues include HTML- and SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. \r\n\r\nSuccessful exploits of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, control how the site is rendered to the user, or exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.\r\n\r\nhttp://www.example.com/search.php?rate=[sql]", "osvdbidlist": ["26923"]}