Description
Multiple SQL injection vulnerabilities in MYRE Real Estate Software (2012 Q2) allow remote attackers to execute arbitrary SQL commands via the (1) link_idd parameter to 1_mobile/listings.php or (2) userid parameter to 1_mobile/agentprofile.php.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Vulnerability-Lab · textwebappsphp
https://www.exploit-db.com/exploits/19132
exploitdb
WORKING POC
VERIFIED
by Vulnerability-Lab · textwebappsphp
https://www.exploit-db.com/exploits/18843
References (4)
Core 4
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/18843
Exploit x_refsource_misc
http://packetstormsecurity.org/files/112480/MYRE-Real-Estate-Mobile-2012-2-Cross-Site-Scripting-SQL-Injection.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/53394
Various Sources x_refsource_misc
http://www.vulnerability-lab.com/get_content.php?id=516
Scores
EPSS
0.0149
EPSS Percentile
81.1%
Details
CWE
CWE-89
Status
published
Products (1)
myrephp/myre_real_estate_software
2012 q2
Published
Aug 13, 2012
Tracked Since
Feb 18, 2026