Zero-day Vulnerability Database
Zero-day vulnerabilities discovered: 1
SQL injection
The vulnerability allows a remote attacker to inject SQL commands on the target system.
The weakness exists in the checkAlias action when processing malformed data passed via "cname" parameter. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL queries in web application database..
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability was being actively exploited.
SQL injection
The vulnerability allows a remote attacker to inject SQL commands on the target system.
The weakness exists in the checkAlias action when processing malformed data passed via "cname" parameter. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL queries in web application database..
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability was being actively exploited.