Multiple SQL injection vulnerabilities in The Address Book 1.04e allow remote attackers to execute arbitrary SQL commands via the (1) lastname, (2) firstname, (3) passwordOld, (4) passwordNew, (5) id, (6) language, (7) defaultLetter, (8) newuserPass, (9) newuserType, (10) newuserEmail parameters in (a) user.php; the (11) goTo and (12) search parameters in (b) search.php; and the (13) groupAddName parameter in (c) save.php.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 00:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://osvdb.org/32568 - | |
| References | () http://osvdb.org/32569 - | |
| References | () http://osvdb.org/32570 - | |
| References | () http://secunia.com/advisories/21694 - | |
| References | () http://secunia.com/secunia_research/2006-76/advisory/ - Exploit, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/21870 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31238 - | 
Information
                Published : 2006-12-31 05:00
Updated : 2025-04-09 00:30
NVD link : CVE-2006-4575
Mitre link : CVE-2006-4575
CVE.ORG link : CVE-2006-4575
JSON object : View
Products Affected
                the_address_book
- the_address_book
CWE
                