Multiple SQL injection vulnerabilities in Pentacle In-Out Board 3.0 and earlier allow remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) newsid parameter to newsdetailsview.asp and (2) password parameter to login.asp.
References
Configurations
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042524.html - | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042525.html - | |
References | () http://secunia.com/advisories/19024 - Exploit, Vendor Advisory | |
References | () http://securitytracker.com/id?1015682 - Exploit, Vendor Advisory | |
References | () http://www.nukedx.com/?viewdoc=13 - Exploit, Vendor Advisory | |
References | () http://www.nukedx.com/?viewdoc=14 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/426074/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/426075/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16818 - Exploit, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/0749 - |
Information
Published : 2006-03-06 20:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-1000
Mitre link : CVE-2006-1000
CVE.ORG link : CVE-2006-1000
JSON object : View
Products Affected
g2soft
- pentacle_in-out_board
CWE