Description
Multiple SQL injection vulnerabilities in phsBlog 0.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) eid parameter to comments.php, (2) cid parameter to index.php, and the (3) urltitle parameter to entries.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by cOndemned · textwebappsphp
https://www.exploit-db.com/exploits/6190
References (3)
Core 3
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6190
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4135
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44163
Scores
EPSS
0.0041
EPSS Percentile
61.7%
Details
CWE
CWE-89
Status
published
Products (1)
phsblog/phsblog
0.1.1
Published
Aug 11, 2008
Tracked Since
Feb 18, 2026