SQL injection vulnerability in Default.asp in EzASPSite 2.0 RC3 and earlier allows remote attackers to execute arbitrary SQL commands and obtain the SHA1 hash of the admin password via the Scheme parameter.
References
Configurations
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=full-disclosure&m=114367573519326&w=2 - | |
References | () http://secunia.com/advisories/19441 - | |
References | () http://www.nukedx.com/?viewdoc=22 - Exploit | |
References | () http://www.osvdb.org/24256 - | |
References | () http://www.securityfocus.com/archive/1/429487/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17309 - | |
References | () http://www.vupen.com/english/advisories/2006/1164 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25544 - | |
References | () https://www.exploit-db.com/exploits/1623 - |
Information
Published : 2006-03-30 11:02
Updated : 2024-11-21 00:09
NVD link : CVE-2006-1541
Mitre link : CVE-2006-1541
CVE.ORG link : CVE-2006-1541
JSON object : View
Products Affected
ezaspsite
- ezaspsite
CWE