CVE-2007-6138

VU Mass Mailer - SQL Injection

Title source: llm
STIX 2.1

Description

SQL injection vulnerability in redir.asp in VU Mass Mailer allows remote attackers to execute arbitrary SQL commands via the password parameter to Default.asp (aka the Login Page). NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Aria-Security Team · textwebappsasp
https://www.exploit-db.com/exploits/30793

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26522
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38807
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/484021/100/0/threaded
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27758
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/3966
Various Sources x_refsource_misc
http://aria-security.net/forum/showthread.php?t=447

Scores

EPSS 0.0062
EPSS Percentile 70.0%

Details

CWE
CWE-89
Status published
Products (1)
vu/mass_mailer
Published Nov 27, 2007
Tracked Since Feb 18, 2026