Multiple SQL injection vulnerabilities in sign.php in Xeobook 0.93 allow remote attackers to execute arbitrary SQL commands via (1) the User-Agent HTTP header, or the (2) gb_entry_text, (3) gb_location, (4) gb_fullname, or (5) gb_sex parameters.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/20476 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29478 | vdb entry |
http://www.securityfocus.com/archive/1/448425/100/0/threaded | mailing list |
http://marc.info/?l=full-disclosure&m=116062281632705&w=2 | mailing list |