Description
SQL injection vulnerability in file_overview.php in TUTOS 1.1 allows remote attackers to execute arbitrary SQL commands via the link_id parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Joxean Koret · textwebappsphp
https://www.exploit-db.com/exploits/24616
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1011363
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/10164
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2006/dsa-980
Exploit, Vendor Advisory mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/375757
Exploit, Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/12606/
Product x_refsource_confirm
http://cvs.sourceforge.net/viewcvs.py/tutos/tutos/php/file/file_overview.php?r1=1.11.2.1&r2=1.11.2.2
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/11221
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/18954
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17444
Scores
EPSS
0.0313
EPSS Percentile
86.9%
Details
Status
published
Products (1)
tutos/tutos
1.1_2004-04-14
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026