CVE-2008-5571

SQL injection vulnerability in admin/login.asp in Professional Download Assistant 0.1 allows remote attackers to execute arbitrary SQL commands via the (1) uname parameter (aka user field) or the (2) psw parameter (aka passwd field). NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dotnetindex:professional_download_assistant:0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:54

Type Values Removed Values Added
References () http://osvdb.org/50548 - () http://osvdb.org/50548 -
References () http://secunia.com/advisories/33030 - Vendor Advisory () http://secunia.com/advisories/33030 - Vendor Advisory
References () http://securityreason.com/securityalert/4749 - () http://securityreason.com/securityalert/4749 -
References () http://www.securityfocus.com/bid/32706 - () http://www.securityfocus.com/bid/32706 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/47170 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/47170 -
References () https://www.exploit-db.com/exploits/7390 - () https://www.exploit-db.com/exploits/7390 -

Information

Published : 2008-12-15 18:00

Updated : 2024-11-21 00:54


NVD link : CVE-2008-5571

Mitre link : CVE-2008-5571

CVE.ORG link : CVE-2008-5571


JSON object : View

Products Affected

dotnetindex

  • professional_download_assistant
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')