CVE-2009-0459

Multiple SQL injection vulnerabilities in admin/login_submit.php in Whole Hog Password Protect: Enhanced 1.x allow remote attackers to execute arbitrary SQL commands via (1) the uid parameter (aka Username field) or (2) the pwd parameter (aka Password field). NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wholehogsoftware:password_protect:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://osvdb.org/51733 - () http://osvdb.org/51733 -
References () http://secunia.com/advisories/33777 - Vendor Advisory () http://secunia.com/advisories/33777 - Vendor Advisory
References () http://www.securityfocus.com/bid/33564 - () http://www.securityfocus.com/bid/33564 -
References () https://www.exploit-db.com/exploits/7941 - () https://www.exploit-db.com/exploits/7941 -

Information

Published : 2009-02-10 07:00

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0459

Mitre link : CVE-2009-0459

CVE.ORG link : CVE-2009-0459


JSON object : View

Products Affected

wholehogsoftware

  • password_protect
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')