Multiple SQL injection vulnerabilities in default.asp in MyDesign Sayac 2.0 allow remote attackers to execute arbitrary SQL commands via (1) the user parameter (aka UserName field) or (2) the pass parameter (aka Pass field) to (a) admin/admin.asp or (b) the default URI under admin/. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/33593 | Exploit |
http://secunia.com/advisories/33771 | Vendor Advisory |
http://osvdb.org/51754 | |
https://www.exploit-db.com/exploits/7963 |
Configurations
Information
Published : 2009-02-09 23:00
Updated : 2017-09-28 18:33
NVD link : CVE-2009-0447
Mitre link : CVE-2009-0447
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
aspindir
- mydesign_sayac