SQL injection vulnerability in auktion.php in Pay Per Watch & Bid Auktions System allows remote attackers to execute arbitrary SQL commands via the id_auk parameter.
4004securityproject.wordpress.com/2010/03/20/pay-per-watch-bid-auktions-system-blind-sql-injection-auktion-php-id_auk/
osvdb.org/63131
packetstormsecurity.org/1003-exploits/ppwb-sql.txt
secunia.com/advisories/39059
www.exploit-db.com/exploits/11816
www.securityfocus.com/bid/38878
www.vupen.com/english/advisories/2010/0670
exchange.xforce.ibmcloud.com/vulnerabilities/57055