CVE-2008-4175

Linkbidscript - SQL Injection

Title source: rule
STIX 2.1

Description

Multiple SQL injection vulnerabilities in Link Bid Script 1.5 allow remote attackers to execute arbitrary SQL commands via the (1) ucat parameter to upgrade.php and the (2) id parameter to linkadmin/edit.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by SirGod · textwebappsphp
https://www.exploit-db.com/exploits/6466

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45153
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45155
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/6466
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31853
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/31191
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4299

Scores

EPSS 0.0065
EPSS Percentile 71.0%

Details

CWE
CWE-89
Status published
Products (1)
linkbidscript/linkbidscript 1.5
Published Sep 23, 2008
Tracked Since Feb 18, 2026