SQL injection vulnerability in the do_mysql_query function in core.php for Open Searchable Image Catalogue (OSIC) before 0.7.0.1 allows remote attackers to inject arbitrary SQL commands via multiple vectors, as demonstrated by the (1) type parameter in adminfunctions.php and the (2) catalogue_id parameter in editcatalogue.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20341 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1014 - | |
References | () http://securitytracker.com/id?1016178 - | |
References | () http://sourceforge.net/forum/forum.php?forum_id=576483 - | |
References | () http://svn.sourceforge.net/viewcvs.cgi/osic-win/branches/osic_0-7/osic/core.php?r1=477&r2=631 - | |
References | () http://www.seclab.tuwien.ac.at/advisories/TUVSA-0605-001.txt - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/435380/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18169 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26968 - |
Information
Published : 2006-06-01 10:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-2748
Mitre link : CVE-2006-2748
CVE.ORG link : CVE-2006-2748
JSON object : View
Products Affected
open_searchable_image_catalogue
- open_searchable_image_catalogue
CWE