SQL injection vulnerability in exit.php for Serendipity 0.8 and previous versions allows remote malicious users to execute arbitrary SQL commands via the (1) url_id or (2) entry_id parameters.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
s9y serendipity 0.6_pl2 |
||
s9y serendipity 0.6_pl3 |
||
s9y serendipity 0.7_beta4 |
||
s9y serendipity 0.7_rc1 |
||
s9y serendipity 0.5 |
||
s9y serendipity 0.5_pl1 |
||
s9y serendipity 0.7 |
||
s9y serendipity 0.7_beta1 |
||
s9y serendipity 0.6 |
||
s9y serendipity 0.6_pl1 |
||
s9y serendipity 0.7_beta2 |
||
s9y serendipity 0.7_beta3 |
||
s9y serendipity 0.3 |
||
s9y serendipity 0.4 |
||
s9y serendipity 0.6_rc1 |
||
s9y serendipity 0.6_rc2 |
||
s9y serendipity 0.8_beta5 |
||
s9y serendipity 0.8_beta6 |