SQL injection vulnerability in DSPoll 1.1 allows remote attackers to execute arbitrary SQL commands via the pollid parameter to (1) results.php, (2) topolls.php, (3) pollit.php.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://evuln.com/vulns/96/summary.html - Vendor Advisory | |
References | () http://secunia.com/advisories/19209 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/620 - | |
References | () http://securityreason.com/securityalert/622 - | |
References | () http://securitytracker.com/id?1015758 - | |
References | () http://www.osvdb.org/23879 - | |
References | () http://www.osvdb.org/23880 - | |
References | () http://www.osvdb.org/23881 - | |
References | () http://www.securityfocus.com/archive/1/428663/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17103 - | |
References | () http://www.vupen.com/english/advisories/2006/0932 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25192 - |
Information
Published : 2006-03-14 02:02
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1217
Mitre link : CVE-2006-1217
CVE.ORG link : CVE-2006-1217
JSON object : View
Products Affected
dsportal
- dspoll
CWE