Online Art Gallery Shop

4 CVEs product

Monthly

CVE-2026-3759 HIGH POC This Week

SQL injection in projectworlds Online Art Gallery Shop 1.0 via the reach_nm parameter in /admin/adminHome.php allows unauthenticated remote attackers to manipulate database queries and potentially extract sensitive data or modify database contents. Public exploit code exists for this vulnerability, increasing exploitation risk. No patch is currently available for affected installations.

PHP SQLi Online Art Gallery Shop
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3758 HIGH POC This Week

SQL injection in projectworlds Online Art Gallery Shop 1.0 allows unauthenticated remote attackers to manipulate the Info parameter in /admin/adminHome.php, potentially enabling unauthorized database access and data theft. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. No patch is currently available, requiring organizations to implement compensating controls or upgrade to a patched version when released.

PHP SQLi Online Art Gallery Shop
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3757 HIGH POC This Week

SQL injection in projectworlds Online Art Gallery Shop 1.0 allows unauthenticated remote attackers to manipulate the fnm parameter via the /?pass=1 endpoint, potentially enabling unauthorized database access and modification. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected installations at immediate risk.

SQLi Online Art Gallery Shop
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3406 HIGH POC This Week

SQL injection in Online Art Gallery Shop 1.0 via the fname parameter in /admin/registration.php enables unauthenticated remote attackers to manipulate database queries. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected PHP installations at immediate risk of data compromise or unauthorized access.

PHP SQLi Online Art Gallery Shop
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-3759
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in projectworlds Online Art Gallery Shop 1.0 via the reach_nm parameter in /admin/adminHome.php allows unauthenticated remote attackers to manipulate database queries and potentially extract sensitive data or modify database contents. Public exploit code exists for this vulnerability, increasing exploitation risk. No patch is currently available for affected installations.

PHP SQLi Online Art Gallery Shop
NVD GitHub VulDB
CVE-2026-3758
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in projectworlds Online Art Gallery Shop 1.0 allows unauthenticated remote attackers to manipulate the Info parameter in /admin/adminHome.php, potentially enabling unauthorized database access and data theft. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. No patch is currently available, requiring organizations to implement compensating controls or upgrade to a patched version when released.

PHP SQLi Online Art Gallery Shop
NVD GitHub VulDB
CVE-2026-3757
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in projectworlds Online Art Gallery Shop 1.0 allows unauthenticated remote attackers to manipulate the fnm parameter via the /?pass=1 endpoint, potentially enabling unauthorized database access and modification. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected installations at immediate risk.

SQLi Online Art Gallery Shop
NVD GitHub VulDB
CVE-2026-3406
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in Online Art Gallery Shop 1.0 via the fname parameter in /admin/registration.php enables unauthenticated remote attackers to manipulate database queries. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected PHP installations at immediate risk of data compromise or unauthorized access.

PHP SQLi Online Art Gallery Shop
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy