CVE-2009-0447

MyDesign Sayac 2.0 - SQL Injection

Title source: llm
STIX 2.1

Description

Multiple SQL injection vulnerabilities in default.asp in MyDesign Sayac 2.0 allow remote attackers to execute arbitrary SQL commands via (1) the user parameter (aka UserName field) or (2) the pass parameter (aka Pass field) to (a) admin/admin.asp or (b) the default URI under admin/. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Kacak · textwebappsasp
https://www.exploit-db.com/exploits/7963

References (4)

Core 4
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/33593
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33771
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/51754
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7963

Scores

EPSS 0.0049
EPSS Percentile 65.4%

Details

CWE
CWE-89
Status published
Products (1)
aspindir/mydesign_sayac 2.0
Published Feb 10, 2009
Tracked Since Feb 18, 2026