Multiple SQL injection vulnerabilities in Pro Publish 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) email and (2) password parameter to (a) admin/login.php, (3) find_str parameter to (b) search.php, or (4) artid parameter to (c) art.php, or (5) catid parameter to (d) cat.php.
References
Configurations
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://evuln.com/vulns/130/summary.html - | |
References | () http://secunia.com/advisories/19882 - Vendor Advisory | |
References | () http://soot.shabgard.org/bugs/propublish.txt - | |
References | () http://www.osvdb.org/25124 - | |
References | () http://www.osvdb.org/25125 - | |
References | () http://www.osvdb.org/25126 - | |
References | () http://www.osvdb.org/25127 - | |
References | () http://www.securityfocus.com/archive/1/435787/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17762 - | |
References | () http://www.vupen.com/english/advisories/2006/1578 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26148 - |
Information
Published : 2006-05-01 23:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-2128
Mitre link : CVE-2006-2128
CVE.ORG link : CVE-2006-2128
JSON object : View
Products Affected
deltascripts
- pro_publish
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')