CVE-2006-1232

DSDownload 1.0 - SQL Injection

Title source: llm
STIX 2.1

Description

Multiple SQL injection vulnerabilities in DSDownload 1.0, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the (1) key and (2) category parameters to (a) search.php and (b) downloads.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Aliaksandr Hartsuyeu · textwebappsphp
https://www.exploit-db.com/exploits/27424

References (10)

Core 10
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/23886
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1015755
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25193
Various Sources x_refsource_misc
http://evuln.com/vulns/99/summary.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/17116
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19202
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/23887
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/626
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0934
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/428808/100/0/threaded

Scores

EPSS 0.0364
EPSS Percentile 87.9%

Details

Status published
Products (1)
dsportal/dsdownload 1.0
Published Mar 14, 2006
Tracked Since Feb 18, 2026