CVE-2006-1426

Multiple SQL injection vulnerabilities in Pixel Motion Blog allow remote attackers to execute arbitrary SQL commands via the (1) date parameter in index.php or bypass authentication via the (2) password parameter in admin/index.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pixel_motion:pixel_motion_blog:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:08

Type Values Removed Values Added
References () http://secunia.com/advisories/19421 - Exploit, Vendor Advisory () http://secunia.com/advisories/19421 - Exploit, Vendor Advisory
References () http://www.osvdb.org/24168 - () http://www.osvdb.org/24168 -
References () http://www.osvdb.org/24169 - () http://www.osvdb.org/24169 -
References () http://www.securityfocus.com/archive/1/428964/100/0/threaded - () http://www.securityfocus.com/archive/1/428964/100/0/threaded -
References () http://www.securityfocus.com/bid/17260 - Exploit () http://www.securityfocus.com/bid/17260 - Exploit
References () http://www.vupen.com/english/advisories/2006/1135 - () http://www.vupen.com/english/advisories/2006/1135 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25478 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25478 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25481 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25481 -

Information

Published : 2006-03-28 20:02

Updated : 2024-11-21 00:08


NVD link : CVE-2006-1426

Mitre link : CVE-2006-1426

CVE.ORG link : CVE-2006-1426


JSON object : View

Products Affected

pixel_motion

  • pixel_motion_blog