Multiple SQL injection vulnerabilities in Small Pirate (SPirate) 2.1 allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to the default URI in an rss .xml action, or the id parameter to (2) pag1.php, (3) pag1-guest.php, (4) rss-comment_post.php (aka rss-coment_post.php), or (5) rss-pic-comment.php.
References
Configurations
History
21 Nov 2024, 01:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/54784 - | |
References | () http://osvdb.org/54785 - Exploit | |
References | () http://osvdb.org/54786 - Exploit | |
References | () http://osvdb.org/54787 - Exploit | |
References | () http://osvdb.org/54788 - Exploit | |
References | () http://secunia.com/advisories/35272 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/8819 - | |
References | () http://www.securityfocus.com/archive/1/503863/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/50837 - |
Information
Published : 2010-07-22 05:40
Updated : 2024-11-21 01:10
NVD link : CVE-2009-4936
Mitre link : CVE-2009-4936
CVE.ORG link : CVE-2009-4936
JSON object : View
Products Affected
spirate
- small_pirate
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')