CVE-2008-4175

Multiple SQL injection vulnerabilities in Link Bid Script 1.5 allow remote attackers to execute arbitrary SQL commands via the (1) ucat parameter to upgrade.php and the (2) id parameter to linkadmin/edit.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linkbidscript:linkbidscript:1.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:51

Type Values Removed Values Added
References () http://secunia.com/advisories/31853 - () http://secunia.com/advisories/31853 -
References () http://securityreason.com/securityalert/4299 - () http://securityreason.com/securityalert/4299 -
References () http://www.securityfocus.com/bid/31191 - () http://www.securityfocus.com/bid/31191 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45153 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/45153 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45155 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/45155 -
References () https://www.exploit-db.com/exploits/6466 - () https://www.exploit-db.com/exploits/6466 -

Information

Published : 2008-09-23 15:25

Updated : 2025-04-09 00:30


NVD link : CVE-2008-4175

Mitre link : CVE-2008-4175

CVE.ORG link : CVE-2008-4175


JSON object : View

Products Affected

linkbidscript

  • linkbidscript
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')