SQL injection vulnerability in exit.php for Serendipity 0.8 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) url_id or (2) entry_id parameters.
References
Link | Resource |
---|---|
http://seclists.org/lists/bugtraq/2005/Apr/0195.html | |
http://www.s9y.org/5.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/13161 | Exploit Patch Vendor Advisory |
http://www.s9y.org/63.html#A9 | Patch Vendor Advisory |
http://www.osvdb.org/15542 | Vendor Advisory |
http://securitytracker.com/id?1013699 | Vendor Advisory |
http://secunia.com/advisories/15145 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20119 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-04-12 21:00
Updated : 2017-07-10 18:32
NVD link : CVE-2005-1134
Mitre link : CVE-2005-1134
JSON object : View
CWE
Products Affected
s9y
- serendipity