Description
SQL injection vulnerability in report.php in Mr. CGI Guy Hot Links SQL-PHP 3.0 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by ThE g0bL!N · textwebappsphp
https://www.exploit-db.com/exploits/8918
References (5)
Core 5
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/31078
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44991
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/8918
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6403
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4336
Scores
EPSS
0.0044
EPSS Percentile
63.0%
Details
CWE
CWE-89
Status
published
Products (1)
mr._cgi_guy/hot_links_sql_php
< 3.0
Published
Oct 01, 2008
Tracked Since
Feb 18, 2026