Multiple SQL injection vulnerabilities in Link Bid Script 1.5 allow remote attackers to execute arbitrary SQL commands via the (1) ucat parameter to upgrade.php and the (2) id parameter to linkadmin/edit.php.
References
Configurations
History
21 Nov 2024, 00:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31853 - | |
References | () http://securityreason.com/securityalert/4299 - | |
References | () http://www.securityfocus.com/bid/31191 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45153 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45155 - | |
References | () https://www.exploit-db.com/exploits/6466 - |
Information
Published : 2008-09-23 15:25
Updated : 2025-04-09 00:30
NVD link : CVE-2008-4175
Mitre link : CVE-2008-4175
CVE.ORG link : CVE-2008-4175
JSON object : View
Products Affected
linkbidscript
- linkbidscript
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')