CVE-2010-1071

phpmdj 1.0.3 - SQL Injection via profil.php id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2010-1071. PoCs published by k4cp3r & Ablus.

AI-analyzed exploit summary This is a writeup describing a SQL injection vulnerability in phpMDJ 1.0.3. The vulnerability occurs in the 'profile.php' script due to improper sanitization of the 'id' parameter, allowing an attacker to inject malicious SQL queries.

Description

SQL injection vulnerability in profil.php in phpMDJ 1.0.3 allows remote attackers to execute arbitrary SQL commands via the id parameter.

Exploits (1)

exploitdb WRITEUP
by k4cp3r & Ablus · textwebappsphp
https://www.exploit-db.com/exploits/11083

This is a writeup describing a SQL injection vulnerability in phpMDJ 1.0.3. The vulnerability occurs in the 'profile.php' script due to improper sanitization of the 'id' parameter, allowing an attacker to inject malicious SQL queries.

Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: phpMDJ 1.0.3
No auth needed
Prerequisites: Access to the vulnerable 'profile.php' script
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (5)

Core 5
Core References
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/11083
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33480
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/55516
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/37698

Scores

EPSS 0.0049
EPSS Percentile 65.7%

Details

CWE
CWE-89
Status published
Products (1)
phpmdj/phpmdj 1.0.3
Published Mar 23, 2010
Tracked Since Feb 18, 2026