SQL injection vulnerability in phpBannerExchange before 2.0 Update 6 allows remote attackers to execute arbitrary SQL commands via the (1) login parameter in (a) client/stats.php and (b) admin/stats.php, or the (2) pass parameter in client/stats.php.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Phpbannerexchange | Eschew.net | 2.0 (including) | 2.0 (including) |
Phpbannerexchange | Eschew.net | 2.0_update_1 (including) | 2.0_update_1 (including) |
Phpbannerexchange | Eschew.net | 2.0_update_2 (including) | 2.0_update_2 (including) |
Phpbannerexchange | Eschew.net | 2.0_update_3 (including) | 2.0_update_3 (including) |
Phpbannerexchange | Eschew.net | 2.0_update_4 (including) | 2.0_update_4 (including) |
Phpbannerexchange | Eschew.net | 2.0_update_5 (including) | 2.0_update_5 (including) |