Description
Multiple SQL injection vulnerabilities in psipuss 1.0 allow remote attackers to execute arbitrary SQL commands via (1) the Cid parameter to categories.php or (2) the Username parameter to login.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Virangar Security · textwebappsphp
https://www.exploit-db.com/exploits/6226
References (6)
Core 6
Core References
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/25041/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44367
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/35500
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4140
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6226
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/30629
Scores
EPSS
0.0079
EPSS Percentile
74.0%
Details
CWE
CWE-89
Status
published
Products (1)
psi-labs/psipuss
1.0
Published
Aug 12, 2008
Tracked Since
Feb 18, 2026