Multiple SQL injection vulnerabilities in Pixel Motion Blog allow remote attackers to execute arbitrary SQL commands via the (1) date parameter in index.php or bypass authentication via the (2) password parameter in admin/index.php.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19421 - Exploit, Vendor Advisory | |
References | () http://www.osvdb.org/24168 - | |
References | () http://www.osvdb.org/24169 - | |
References | () http://www.securityfocus.com/archive/1/428964/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17260 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/1135 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25478 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25481 - |
Information
Published : 2006-03-28 20:02
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1426
Mitre link : CVE-2006-1426
CVE.ORG link : CVE-2006-1426
JSON object : View
Products Affected
pixel_motion
- pixel_motion_blog
CWE