Multiple SQL injection vulnerabilities in tplSoccerSite 1.0 allow remote attackers to execute arbitrary SQL commands via (1) the opp parameter to tampereunited/opponent.php; or the id parameter to (2) index.php, (3) player.php, (4) matchdetails.php, or (5) additionalpage.php in tampereunited/.
References
Configurations
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31111 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/4018 - | |
References | () http://tpl-design.com/index.php - Patch | |
References | () http://www.securityfocus.com/bid/30260 - Patch | |
References | () http://www.vupen.com/english/advisories/2008/2121/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43849 - | |
References | () https://www.exploit-db.com/exploits/6088 - |
Information
Published : 2008-07-21 17:41
Updated : 2025-04-09 00:30
NVD link : CVE-2008-3251
Mitre link : CVE-2008-3251
CVE.ORG link : CVE-2008-3251
JSON object : View
Products Affected
tpl_design
- tplsoccersite
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')