CVE-2004-2042

Multiple SQL injection vulnerabilities in e107 0.615 allow remote attackers to inject arbitrary SQL code and gain sensitive information via (1) content parameter to content.php, (2) content_id parameter to content.php, or (3) list parameter to news.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*
cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*

History

20 Nov 2024, 23:52

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=108588043007224&w=2 - () http://marc.info/?l=bugtraq&m=108588043007224&w=2 -
References () http://marc.info/?l=full-disclosure&m=108586723116427&w=2 - () http://marc.info/?l=full-disclosure&m=108586723116427&w=2 -
References () http://secunia.com/advisories/11740 - Patch, Vendor Advisory () http://secunia.com/advisories/11740 - Patch, Vendor Advisory
References () http://www.osvdb.org/6531 - Exploit, Patch, Vendor Advisory () http://www.osvdb.org/6531 - Exploit, Patch, Vendor Advisory
References () http://www.osvdb.org/6532 - Exploit, Tool Signature, Vendor Advisory () http://www.osvdb.org/6532 - Exploit, Tool Signature, Vendor Advisory
References () http://www.osvdb.org/6533 - Exploit, Patch, Vendor Advisory () http://www.osvdb.org/6533 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/10436 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/10436 - Exploit, Patch, Vendor Advisory
References () http://www.waraxe.us/index.php?modname=sa&id=31 - Exploit, Patch, Vendor Advisory () http://www.waraxe.us/index.php?modname=sa&id=31 - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16283 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16283 -

Information

Published : 2004-05-29 04:00

Updated : 2024-11-20 23:52


NVD link : CVE-2004-2042

Mitre link : CVE-2004-2042

CVE.ORG link : CVE-2004-2042


JSON object : View

Products Affected

e107

  • e107