CVE-2006-0939

Dci-designs Dci-taskeen - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in DCI-Taskeen 1.03 allows remote attackers to execute arbitrary SQL commands via the (1) id or (2) action parameter to (a) basket.php, or (3) id or (4) page parameter to (b) cat.php.

Exploits (2)

exploitdb WRITEUP VERIFIED
by Linux_Drox · textwebappsphp
https://www.exploit-db.com/exploits/27314
exploitdb WRITEUP VERIFIED
by Linux_Drox · textwebappsphp
https://www.exploit-db.com/exploits/27313

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24963
Exploit mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/426082
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/16828
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/495
Exploit vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1015685

Scores

EPSS 0.0055
EPSS Percentile 68.2%

Details

Status published
Products (1)
dci-designs/dci-taskeen 1.03
Published Mar 01, 2006
Tracked Since Feb 18, 2026