CVE-2004-1647

SQL injection vulnerability in Password Protect allows remote attackers to execute arbitrary SQL statements and bypass authentication via (1) admin or Pass parameter to index_next.asp, (2) LoginId, OPass, or NPass to CPassChangePassword.asp, (3) users_edit.asp, or (4) users_add.asp.
Configurations

Configuration 1 (hide)

cpe:2.3:a:web_animations:password_protect:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109414967003192&w=2 - () http://marc.info/?l=bugtraq&m=109414967003192&w=2 -
References () http://secunia.com/advisories/12407 - Vendor Advisory () http://secunia.com/advisories/12407 - Vendor Advisory
References () http://www.criolabs.net/advisories/passprotect.txt - URL Repurposed () http://www.criolabs.net/advisories/passprotect.txt - URL Repurposed
References () http://www.securityfocus.com/bid/11073 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/11073 - Exploit, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17188 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17188 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://www.criolabs.net/advisories/passprotect.txt - () http://www.criolabs.net/advisories/passprotect.txt - URL Repurposed

Information

Published : 2004-08-30 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2004-1647

Mitre link : CVE-2004-1647

CVE.ORG link : CVE-2004-1647


JSON object : View

Products Affected

web_animations

  • password_protect