Description
Multiple SQL injection vulnerabilities in Maian Weblog 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) entry and (2) email parameters to (a) print.php and (b) mail.php.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Aliaksandr Hartsuyeu · textwebappsphp
https://www.exploit-db.com/exploits/27477
exploitdb
WORKING POC
VERIFIED
by Aliaksandr Hartsuyeu · textwebappsphp
https://www.exploit-db.com/exploits/27478
References (11)
Core 11
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/23946
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/638
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0994
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17247
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/428903/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17159
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015818
Various Sources x_refsource_misc
http://evuln.com/vulns/101/summary.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19273
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25295
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/23945
Scores
EPSS
0.0353
EPSS Percentile
87.7%
Details
Status
published
Products (1)
maian_script_world/maian_weblog
< 2.0
Published
Mar 21, 2006
Tracked Since
Feb 18, 2026