CVE-2008-6696

SQL injection vulnerability in Fussballtippspiel (toto) 0.1.1 and earlier extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
OR cpe:2.3:a:manu_oehler:toto:*:*:*:*:*:*:*:*
cpe:2.3:a:manu_oehler:toto:0.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:57

Type Values Removed Values Added
References () http://osvdb.org/46394 - () http://osvdb.org/46394 -
References () http://typo3.org/extensions/repository/view/toto/0.1.2/ - () http://typo3.org/extensions/repository/view/toto/0.1.2/ -
References () http://typo3.org/teams/security/security-bulletins/typo3-20080619-1/ - Patch, Vendor Advisory () http://typo3.org/teams/security/security-bulletins/typo3-20080619-1/ - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/29824 - () http://www.securityfocus.com/bid/29824 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43212 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43212 -

Information

Published : 2009-04-10 22:00

Updated : 2024-11-21 00:57


NVD link : CVE-2008-6696

Mitre link : CVE-2008-6696

CVE.ORG link : CVE-2008-6696


JSON object : View

Products Affected

typo3

  • typo3

manu_oehler

  • toto
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')