Multiple SQL injection vulnerabilities in MGinternet Property Site Manager allow remote attackers to execute arbitrary SQL commands via the (1) p parameter to (a) detail.asp; the (2) l, (3) typ, or (4) loc parameter to (b) listings.asp; or the (5) Password or (6) Username parameter to (c) admin_login.asp. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/2078 - | |
References | () http://www.securityfocus.com/archive/1/451565 - Exploit | |
References | () http://www.securityfocus.com/bid/21073 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30289 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30291 - |
Information
Published : 2006-12-23 01:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6709
Mitre link : CVE-2006-6709
CVE.ORG link : CVE-2006-6709
JSON object : View
Products Affected
mginternet
- property_site_manager
CWE