SQL injection vulnerability in processlogin.asp in Katy Whitton RankEm allows remote attackers to execute arbitrary SQL commands via the (1) txtusername parameter (aka username field) or the (2) txtpassword parameter (aka password field). NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/33012 - Exploit | |
References | () http://securityreason.com/securityalert/4746 - | |
References | () http://www.securityfocus.com/bid/32686 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/47114 - | |
References | () https://www.exploit-db.com/exploits/7350 - |
Information
Published : 2008-12-16 19:07
Updated : 2025-04-09 00:30
NVD link : CVE-2008-5589
Mitre link : CVE-2008-5589
CVE.ORG link : CVE-2008-5589
JSON object : View
Products Affected
katywhitton
- rankem
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')