Multiple SQL injection vulnerabilities in Active Auction House allow remote attackers to execute arbitrary SQL commands via the (1) catid, (2) SortDir, or (3) Sortby parameter to default.asp, (4) itemID parameter to ItemInfo.asp, or (5) Email field to sendpassword.asp.
References
Configurations
History
20 Nov 2024, 23:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://digitalparadox.org/advisories/aass.txt - | |
References | () http://marc.info/?l=bugtraq&m=111280834000432&w=2 - | |
References | () http://secunia.com/advisories/14839 - Vendor Advisory | |
References | () http://www.osvdb.org/15281 - | |
References | () http://www.osvdb.org/15282 - | |
References | () http://www.osvdb.org/15283 - | |
References | () http://www.securityfocus.com/bid/13032 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/13034 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/13035 - Vendor Advisory | |
References | () http://www.securitytracker.com/alerts/2005/Apr/1013649.html - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19977 - |
Information
Published : 2005-04-06 04:00
Updated : 2024-11-20 23:56
NVD link : CVE-2005-1029
Mitre link : CVE-2005-1029
CVE.ORG link : CVE-2005-1029
JSON object : View
Products Affected
active_web_softwares
- active_auction_house
CWE