Multiple SQL injection vulnerabilities in paFileDB 3.1 and earlier allow remote attackers to execute arbitrary SQL commands via the formname parameter (1) in the login form, (2) in the team login form, or (3) to auth.php, (4) select, (5) id, or (6) query parameter to pafiledb.php, or (7) string parameter to search.php.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=111885787217807&w=2 - | |
References | () http://www.gulftech.org/?node=research&article_id=00082-06142005 - Exploit, Patch | |
References | () http://www.phparena.net/ - Patch | |
References | () http://www.phparena.net/pafiledb_patch/ - Patch |
Information
Published : 2005-06-15 04:00
Updated : 2024-11-20 23:58
NVD link : CVE-2005-2000
Mitre link : CVE-2005-2000
CVE.ORG link : CVE-2005-2000
JSON object : View
Products Affected
php_arena
- pafiledb
CWE