CVE-2006-6090

Multiple SQL injection vulnerabilities in BaalAsp forum allow remote attackers to execute arbitrary SQL commands via the (1) password parameter to (a) adminlogin.asp, the (2) name or (3) password parameter to (b) userlogin.asp, or the (3) search parameter to search.asp.
Configurations

Configuration 1 (hide)

cpe:2.3:a:baalasp:smart_form_portal:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:21

Type Values Removed Values Added
References () http://s-a-p.ca/index.php?page=OurAdvisories&id=35 - Exploit, Vendor Advisory, URL Repurposed () http://s-a-p.ca/index.php?page=OurAdvisories&id=35 - Exploit, Vendor Advisory, URL Repurposed
References () http://secunia.com/advisories/22943 - Vendor Advisory () http://secunia.com/advisories/22943 - Vendor Advisory
References () http://securityreason.com/securityalert/1913 - () http://securityreason.com/securityalert/1913 -
References () http://www.securityfocus.com/archive/1/451846/100/100/threaded - () http://www.securityfocus.com/archive/1/451846/100/100/threaded -
References () http://www.securityfocus.com/bid/21111 - Exploit () http://www.securityfocus.com/bid/21111 - Exploit
References () http://www.vupen.com/english/advisories/2006/4579 - () http://www.vupen.com/english/advisories/2006/4579 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30342 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30342 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30343 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30343 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://s-a-p.ca/index.php?page=OurAdvisories&id=35 - Exploit, Vendor Advisory () http://s-a-p.ca/index.php?page=OurAdvisories&id=35 - Exploit, Vendor Advisory, URL Repurposed

Information

Published : 2006-11-24 18:07

Updated : 2024-11-21 00:21


NVD link : CVE-2006-6090

Mitre link : CVE-2006-6090

CVE.ORG link : CVE-2006-6090


JSON object : View

Products Affected

baalasp

  • smart_form_portal