Multiple SQL injection vulnerabilities in Wuzly 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) u parameter to fp.php, (2) epage parameter to newpage.php, (3) epost parameter to newpost.php, and (4) username parameter to login.php in admin/; or the (5) username parameter to mobile/login.php.
References
Configurations
Information
Published : 2011-12-24 11:55
Updated : 2017-08-28 18:30
NVD link : CVE-2011-3838
Mitre link : CVE-2011-3838
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
wuzly
- wuzly