SQL injection vulnerability in admin/campaign-zone-link.php in OpenX 2.8.10 before revision 81823 allows remote attackers to execute arbitrary SQL commands via the ids[] parameter in a link action.
References
Configurations
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-10/0065.html - Exploit | |
References | () http://osvdb.org/86093 - | |
References | () http://secunia.com/advisories/50877 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/55860 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/79199 - | |
References | () https://svn.openx.org/openx/trunk/www/admin/campaign-zone-link.php - | |
References | () https://www.htbridge.com/advisory/HTB23116 - Exploit |
Information
Published : 2012-10-22 23:55
Updated : 2024-11-21 01:43
NVD link : CVE-2012-4990
Mitre link : CVE-2012-4990
CVE.ORG link : CVE-2012-4990
JSON object : View
Products Affected
openx
- openx
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')