Multiple SQL injection vulnerabilities in CMS Mundo 1.0 build 008, and possibly other versions, allow remote attackers to execute arbitrary SQL commands via the (1) news_id parameter in the (a) news module, (2) searchstring parameter in (b) the search module, (3) id parameter in (c) the webshop module, (4) username parameter in (d) index.php, and (5) Name, (6) Address, (7) Zip, (8) City, (9) Country, and (10) Email fields during (e) a user profile update.
References
Configurations
History
21 Nov 2024, 00:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20589 - Exploit, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2006-52/advisory/ - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1236 - | |
References | () http://www.osvdb.org/27139 - | |
References | () http://www.osvdb.org/27140 - | |
References | () http://www.osvdb.org/27141 - | |
References | () http://www.osvdb.org/27142 - | |
References | () http://www.osvdb.org/27143 - | |
References | () http://www.vupen.com/english/advisories/2006/2783 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27712 - |
Information
Published : 2006-07-13 21:05
Updated : 2025-04-03 01:03
NVD link : CVE-2006-3135
Mitre link : CVE-2006-3135
CVE.ORG link : CVE-2006-3135
JSON object : View
Products Affected
hotwebscripts
- cms_mundo
CWE