Multiple SQL injection vulnerabilities in BaalAsp forum allow remote attackers to execute arbitrary SQL commands via the (1) password parameter to (a) adminlogin.asp, the (2) name or (3) password parameter to (b) userlogin.asp, or the (3) search parameter to search.asp.
References
Configurations
History
21 Nov 2024, 00:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://s-a-p.ca/index.php?page=OurAdvisories&id=35 - Exploit, Vendor Advisory, URL Repurposed | |
References | () http://secunia.com/advisories/22943 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1913 - | |
References | () http://www.securityfocus.com/archive/1/451846/100/100/threaded - | |
References | () http://www.securityfocus.com/bid/21111 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/4579 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30342 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30343 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://s-a-p.ca/index.php?page=OurAdvisories&id=35 - Exploit, Vendor Advisory, URL Repurposed |
Information
Published : 2006-11-24 18:07
Updated : 2024-11-21 00:21
NVD link : CVE-2006-6090
Mitre link : CVE-2006-6090
CVE.ORG link : CVE-2006-6090
JSON object : View
Products Affected
baalasp
- smart_form_portal
CWE