Description
SQL injection vulnerability in protect.php in X-Scripts X-Protection 1.10, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by SirDarckCat · textwebappsphp
https://www.exploit-db.com/exploits/28303
References (6)
Core 6
Core References
Exploit x_refsource_misc
http://downloads.securityfocus.com/vulnerabilities/exploits/x-protection_poc.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/27635
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21282
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3060
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/28088
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/19235
Scores
EPSS
0.0055
EPSS Percentile
68.1%
Details
Status
published
Products (1)
x-scripts/x-statistics
1.10
Published
Aug 01, 2006
Tracked Since
Feb 18, 2026