Multiple SQL injection vulnerabilities in links.php in Gonafish LinksCaffe 3.0 allow remote attackers to execute arbitrary SQL commands via the (1) offset and (2) limit parameters, (3) newdays parameter in a new action, and the (4) link_id parameter in a deadlink action. NOTE: this issue can also be used for path disclosure by a forced SQL error, or to modify PHP files using OUTFILE.
References
Configurations
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21212 - | |
References | () http://securityreason.com/securityalert/1287 - | |
References | () http://securitytracker.com/id?1016584 - | |
References | () http://www.osvdb.org/27518 - | |
References | () http://www.securityfocus.com/archive/1/441087/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19149 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/2983 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27961 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27962 - |
Information
Published : 2006-07-27 01:04
Updated : 2025-04-03 01:03
NVD link : CVE-2006-3884
Mitre link : CVE-2006-3884
CVE.ORG link : CVE-2006-3884
JSON object : View
Products Affected
gonafish
- linkscaffe
CWE