Description
Multiple SQL injection vulnerabilities in Link Bid Script 1.5 allow remote attackers to execute arbitrary SQL commands via the (1) ucat parameter to upgrade.php and the (2) id parameter to linkadmin/edit.php.
Exploits (1)
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45153
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45155
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6466
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31853
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/31191
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4299
Scores
EPSS
0.0065
EPSS Percentile
71.0%
Details
CWE
CWE-89
Status
published
Products (1)
linkbidscript/linkbidscript
1.5
Published
Sep 23, 2008
Tracked Since
Feb 18, 2026