Multiple SQL injection vulnerabilities in Leadhound Full and LITE 2.1, and probably the Network Version "Full Version", allow remote attackers to execute arbitrary SQL commands via the (1) banner parameter in agent_links.pl; the offset parameter in (2) agent_links.pl, (3) agent_transactions.pl, (4) agent_subaffiliates.pl, and (5) agent_summary.pl; the camp_id parameter in (6) agent_transactions_csv.pl, (7) agent_subaffiliates.pl, and (8) agent_camp_det.pl; the (9) login parameter in agent_commission_statement.pl; the logged parameter in (10) agent_commission_statement.pl and (11) agent_camp_det.pl; the (12) agent_id parameter in agent_commission_statement.pl; and the (13) sub parameter in unspecified files.
References
Link | Resource |
---|---|
http://pridels0.blogspot.com/2006/04/leadhound-multiple-vuln.html | |
http://secunia.com/advisories/19867 | Exploit Vendor Advisory |
http://www.osvdb.org/25023 | Exploit |
http://www.osvdb.org/25024 | Exploit |
http://www.osvdb.org/25025 | Exploit |
http://www.osvdb.org/25026 | Exploit |
http://www.osvdb.org/25027 | Exploit |
http://www.osvdb.org/25028 | Exploit |
http://www.osvdb.org/25029 | Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2006-04-26 20:06
Updated : 2024-02-04 16:52
NVD link : CVE-2006-2062
Mitre link : CVE-2006-2062
CVE.ORG link : CVE-2006-2062
JSON object : View
Products Affected
leadhound_network
- leadhound_full
- leadhound_lite
CWE