CVE-2008-6641

Multiple SQL injection vulnerabilities in Shader TV (Beta) allow remote authenticated administrators to execute arbitrary SQL commands via the sid parameter to (1) kanal.asp, (2) google.asp, and (3) hakk.asp in yonet/; and allow remote attackers to execute arbitrary SQL commands via the (4) username or (5) password fields to yonet/default.asp.
Configurations

Configuration 1 (hide)

cpe:2.3:a:aspindir:shader_tv:*:beta:*:*:*:*:*:*

History

21 Nov 2024, 00:57

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/29091 - Exploit () http://www.securityfocus.com/bid/29091 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42261 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/42261 -
References () https://www.exploit-db.com/exploits/5564 - () https://www.exploit-db.com/exploits/5564 -

Information

Published : 2009-04-07 14:17

Updated : 2024-11-21 00:57


NVD link : CVE-2008-6641

Mitre link : CVE-2008-6641

CVE.ORG link : CVE-2008-6641


JSON object : View

Products Affected

aspindir

  • shader_tv
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')