SQL injection vulnerability in admin/login.asp in Professional Download Assistant 0.1 allows remote attackers to execute arbitrary SQL commands via the (1) uname parameter (aka user field) or the (2) psw parameter (aka passwd field). NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/50548 - | |
References | () http://secunia.com/advisories/33030 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/4749 - | |
References | () http://www.securityfocus.com/bid/32706 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/47170 - | |
References | () https://www.exploit-db.com/exploits/7390 - |
Information
Published : 2008-12-15 18:00
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5571
Mitre link : CVE-2008-5571
CVE.ORG link : CVE-2008-5571
JSON object : View
Products Affected
dotnetindex
- professional_download_assistant
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')