Description
SQL injection vulnerability in DCI-Taskeen 1.03 allows remote attackers to execute arbitrary SQL commands via the (1) id or (2) action parameter to (a) basket.php, or (3) id or (4) page parameter to (b) cat.php.
Exploits (2)
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24963
Exploit mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/426082
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/16828
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/495
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015685
Scores
EPSS
0.0055
EPSS Percentile
68.2%
Details
Status
published
Products (1)
dci-designs/dci-taskeen
1.03
Published
Mar 01, 2006
Tracked Since
Feb 18, 2026