Description
SQL injection vulnerability in news.php in Ero Auktion 2.0 and 2010 allows remote attackers to execute arbitrary SQL commands via the id parameter.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Easy Laster · textwebappsphp
https://www.exploit-db.com/exploits/11522
exploitdb
WRITEUP
VERIFIED
by Easy Laster · textwebappsphp
https://www.exploit-db.com/exploits/11521
References (8)
Core 8
Core References
Exploit x_refsource_misc
http://packetstormsecurity.org/1002-exploits/eroauktion2010-sql.txt
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/11521
Exploit x_refsource_misc
http://packetstormsecurity.org/1002-exploits/eroauktion20-sql.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/56446
Exploit x_refsource_misc
http://4004securityproject.wordpress.com/2010/02/21/ero-auktion-2010-sql-injection-news-php/
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/11522
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38666
Exploit x_refsource_misc
http://4004securityproject.wordpress.com/2010/02/21/ero-auktion-v-2-0-sql-injection-news-php/
Scores
EPSS
0.0408
EPSS Percentile
88.6%
Details
CWE
CWE-89
Status
published
Products (2)
mhproducts/ero_auktion
2.0
mhproducts/ero_auktion
2010
Published
Feb 26, 2010
Tracked Since
Feb 18, 2026