CVE-2010-4612

Hycus Cms - SQL Injection

Title source: rule
STIX 2.1

Description

Multiple SQL injection vulnerabilities in index.php in Hycus CMS 1.0.3, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) user_name and (2) usr_email parameters to user/1/hregister.html, (3) usr_email parameter to user/1/hlogin.html, (4) useremail parameter to user/1/forgotpass.html, and the (5) q parameter to search/1.html. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WORKING POC
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/15797

References (9)

Core 9
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/45527
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/42567
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/15797
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/515382/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/64438

Scores

EPSS 0.0119
EPSS Percentile 78.9%

Details

CWE
CWE-89
Status published
Products (1)
hycus/hycus_cms 1.0.3
Published Dec 29, 2010
Tracked Since Feb 18, 2026