CVE-2008-4175

N/A Unknown
Published: September 23, 2008 Modified: April 23, 2026
View on NVD

Description

Multiple SQL injection vulnerabilities in Link Bid Script 1.5 allow remote attackers to execute arbitrary SQL commands via the (1) ucat parameter to upgrade.php and the (2) id parameter to linkadmin/edit.php.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31853
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/4299
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/31191
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/45153
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/45155
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/6466
Source: af854a3a-2127-422b-91ae-364da2661108

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.7%
71th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linkbidscript