Multiple SQL injection vulnerabilities in Pentacle In-Out Board 3.0 and earlier allow remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) newsid parameter to newsdetailsview.asp and (2) password parameter to login.asp.
References
Link | Resource |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042524.html | |
http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042525.html | |
http://secunia.com/advisories/19024 | Exploit Vendor Advisory |
http://securitytracker.com/id?1015682 | Exploit Vendor Advisory |
http://www.nukedx.com/?viewdoc=13 | Exploit Vendor Advisory |
http://www.nukedx.com/?viewdoc=14 | Exploit Vendor Advisory |
http://www.securityfocus.com/archive/1/426074/100/0/threaded | |
http://www.securityfocus.com/archive/1/426075/100/0/threaded | |
http://www.securityfocus.com/bid/16818 | Exploit Vendor Advisory |
http://www.vupen.com/english/advisories/2006/0749 |
Configurations
History
No history.
Information
Published : 2006-03-06 20:06
Updated : 2024-02-04 16:52
NVD link : CVE-2006-1000
Mitre link : CVE-2006-1000
CVE.ORG link : CVE-2006-1000
JSON object : View
Products Affected
g2soft
- pentacle_in-out_board
CWE