Multiple SQL injection vulnerabilities in Pentacle In-Out Board 3.0 and earlier allow remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) newsid parameter to newsdetailsview.asp and (2) password parameter to login.asp.
References
Link | Resource |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042524.html | |
http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042525.html | |
http://secunia.com/advisories/19024 | Exploit Vendor Advisory |
http://securitytracker.com/id?1015682 | Exploit Vendor Advisory |
http://www.nukedx.com/?viewdoc=13 | Exploit Vendor Advisory |
http://www.nukedx.com/?viewdoc=14 | Exploit Vendor Advisory |
http://www.securityfocus.com/archive/1/426074/100/0/threaded | |
http://www.securityfocus.com/archive/1/426075/100/0/threaded | |
http://www.securityfocus.com/bid/16818 | Exploit Vendor Advisory |
http://www.vupen.com/english/advisories/2006/0749 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2006-03-06T20:00:00
Updated: 2018-10-18T14:57:01
Reserved: 2006-03-06T00:00:00
Link: CVE-2006-1000
JSON object: View
NVD Information
Status : Modified
Published: 2006-03-06T20:06:00.000
Modified: 2018-10-18T16:30:09.463
Link: CVE-2006-1000
JSON object: View
Redhat Information
No data.
CWE