CVE-2008-6364

SQL injection vulnerability in logon_process.jsp in Ad Server Solutions Banner Exchange Solution Java allows remote attackers to execute arbitrary SQL commands via the (1) username (uname parameter) and (2) password (pass parameter). NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:adserversolutions:banner_exchange_software:-:java:*:*:*:*:*:*

History

21 Nov 2024, 00:56

Type Values Removed Values Added
References () http://packetstorm.linuxsecurity.com/0812-exploits/bej-sql.txt - Exploit () http://packetstorm.linuxsecurity.com/0812-exploits/bej-sql.txt - Exploit
References () http://secunia.com/advisories/33072 - Vendor Advisory () http://secunia.com/advisories/33072 - Vendor Advisory
References () http://www.securityfocus.com/bid/32781 - Exploit () http://www.securityfocus.com/bid/32781 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/47281 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/47281 -
References () https://www.exploit-db.com/exploits/7425 - () https://www.exploit-db.com/exploits/7425 -

Information

Published : 2009-03-02 16:30

Updated : 2024-11-21 00:56


NVD link : CVE-2008-6364

Mitre link : CVE-2008-6364

CVE.ORG link : CVE-2008-6364


JSON object : View

Products Affected

adserversolutions

  • banner_exchange_software
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')