CVE-2005-2000

Multiple SQL injection vulnerabilities in paFileDB 3.1 and earlier allow remote attackers to execute arbitrary SQL commands via the formname parameter (1) in the login form, (2) in the team login form, or (3) to auth.php, (4) select, (5) id, or (6) query parameter to pafiledb.php, or (7) string parameter to search.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php_arena:pafiledb:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:php_arena:pafiledb:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php_arena:pafiledb:3.0:*:*:*:*:*:*:*
cpe:2.3:a:php_arena:pafiledb:3.0_beta_3.1:*:*:*:*:*:*:*
cpe:2.3:a:php_arena:pafiledb:3.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=111885787217807&w=2 - () http://marc.info/?l=bugtraq&m=111885787217807&w=2 -
References () http://www.gulftech.org/?node=research&article_id=00082-06142005 - Exploit, Patch () http://www.gulftech.org/?node=research&article_id=00082-06142005 - Exploit, Patch
References () http://www.phparena.net/ - Patch () http://www.phparena.net/ - Patch
References () http://www.phparena.net/pafiledb_patch/ - Patch () http://www.phparena.net/pafiledb_patch/ - Patch

Information

Published : 2005-06-15 04:00

Updated : 2024-11-20 23:58


NVD link : CVE-2005-2000

Mitre link : CVE-2005-2000

CVE.ORG link : CVE-2005-2000


JSON object : View

Products Affected

php_arena

  • pafiledb