CVE-2006-4122

Simple one-file guestbook 1.0 and earlier allows remote attackers to bypass authentication and delete guestbook entries via a modified id parameter to guestbook.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:simple_one-file_guestbook:simple_one-file_guestbook:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://it.security.netsons.org/exploit/simplegb.txt - Exploit, Vendor Advisory () http://it.security.netsons.org/exploit/simplegb.txt - Exploit, Vendor Advisory
References () http://secunia.com/advisories/21429 - Vendor Advisory () http://secunia.com/advisories/21429 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/442884/100/0/threaded - () http://www.securityfocus.com/archive/1/442884/100/0/threaded -
References () http://www.securityfocus.com/bid/19437 - Exploit () http://www.securityfocus.com/bid/19437 - Exploit
References () http://www.vupen.com/english/advisories/2006/3229 - () http://www.vupen.com/english/advisories/2006/3229 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28289 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28289 -

Information

Published : 2006-08-14 23:04

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4122

Mitre link : CVE-2006-4122

CVE.ORG link : CVE-2006-4122


JSON object : View

Products Affected

simple_one-file_guestbook

  • simple_one-file_guestbook