Description
SQL injection vulnerability in index.php in Bild Flirt Community 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Easy Laster · rubywebappsphp
https://www.exploit-db.com/exploits/12221
exploitdb
WORKING POC
VERIFIED
by Easy Laster · textwebappsphp
https://www.exploit-db.com/exploits/11648
References (7)
Core 7
Core References
Exploit x_refsource_misc
http://packetstormsecurity.org/1003-exploits/bildflirt-sql.txt
Exploit vdb-entry
x_refsource_osvdb
http://osvdb.org/62780
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/56727
Exploit x_refsource_misc
http://4004securityproject.wordpress.com/2010/03/07/bild-flirt-system-v2-0-index-php-id-sql-injection/
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/38585
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/11648
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38870
Scores
EPSS
0.0377
EPSS Percentile
88.1%
Details
CWE
CWE-89
Status
published
Products (1)
media-products/bild_flirt_community
2.0
Published
Mar 10, 2010
Tracked Since
Feb 18, 2026