Description
SQL injection vulnerability in haberoku.asp in Hunkaray Okul Portaly 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by ertuqrul · textwebappsasp
https://www.exploit-db.com/exploits/30141
References (4)
Core 4
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/24288
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2766
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/38802
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/34988
Scores
EPSS
0.0068
EPSS Percentile
71.6%
Details
Status
published
Products (1)
hunkaray_okul/portaly
1.1
Published
Jun 06, 2007
Tracked Since
Feb 18, 2026