The iDangero.us Chop Slider 3 WordPress plugin version 3.4 and prior contains a blind SQL injection in the id parameter of the get_script/index.php page. The injection is passed through GET parameters, and thus must be encoded, and magic_quotes is applied at the server.
c40d3f2150f043263d7f5b593f87cd6eb6ed9507f109b3c2713e5d016de691c2
WordPress ChopSlider plugin version 3 suffers from a remote SQL injection vulnerability.
e218e1571606da2531f1241428d66e8c95a78bdef1172ab60f7f8313306d3ed9
An authentication bypass vulnerability is present in the stand-alone SITS:Vision component of Tribal SITS in its default configuration, related to unencrypted communications sent by the client each time it is launched. This vulnerability allows unauthenticated attackers to gain access to credentials or execute arbitrary SQL queries on the SITS backend as long as they have access to the client executable or can intercept traffic from a user who does. Version 9.7.0 is affected.
72b6b1b2c50fcb2bd1a4f629d69aabd35faef658148a4bbb263c4cfcc2a47d7a