Description
Multiple SQL injection vulnerabilities in default.asp in MyDesign Sayac 2.0 allow remote attackers to execute arbitrary SQL commands via (1) the user parameter (aka UserName field) or (2) the pass parameter (aka Pass field) to (a) admin/admin.asp or (b) the default URI under admin/. NOTE: some of these details are obtained from third party information.
Exploits (1)
References (4)
Core 4
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33593
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33771
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/51754
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7963
Scores
EPSS
0.0049
EPSS Percentile
65.4%
Details
CWE
CWE-89
Status
published
Products (1)
aspindir/mydesign_sayac
2.0
Published
Feb 10, 2009
Tracked Since
Feb 18, 2026