Multiple SQL injection vulnerabilities in BroadBoard Instant ASP Message Board allow remote attackers to run arbitrary SQL commands via the (1) keywords parameter to search.asp, (2) handle parameter to profile.asp, (3) txtUserHandle parameter to reg2.asp or (4) txtUserEmail parameter to forgot.asp.
References
Configurations
History
20 Nov 2024, 23:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=109630777608244&w=2 - | |
References | () http://secunia.com/advisories/12658 - Vendor Advisory | |
References | () http://securitytracker.com/id?1011419 - | |
References | () http://www.securityfocus.com/bid/11250 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17498 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17500 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17501 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17502 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:51
NVD link : CVE-2004-1555
Mitre link : CVE-2004-1555
CVE.ORG link : CVE-2004-1555
JSON object : View
Products Affected
broadboard_instant
- asp_message_board
CWE