Multiple SQL injection vulnerabilities in Active Auction House allow remote attackers to execute arbitrary SQL commands via the (1) catid, (2) SortDir, or (3) Sortby parameter to default.asp, (4) itemID parameter to ItemInfo.asp, or (5) Email field to sendpassword.asp.
References
Link | Resource |
---|---|
http://digitalparadox.org/advisories/aass.txt | |
http://marc.info/?l=bugtraq&m=111280834000432&w=2 | |
http://secunia.com/advisories/14839 | Vendor Advisory |
http://www.osvdb.org/15281 | |
http://www.osvdb.org/15282 | |
http://www.osvdb.org/15283 | |
http://www.securityfocus.com/bid/13032 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/13034 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/13035 | Vendor Advisory |
http://www.securitytracker.com/alerts/2005/Apr/1013649.html | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19977 |
Configurations
History
No history.
Information
Published : 2005-04-06 04:00
Updated : 2017-07-11 01:32
NVD link : CVE-2005-1029
Mitre link : CVE-2005-1029
CVE.ORG link : CVE-2005-1029
JSON object : View
Products Affected
active_web_softwares
- active_auction_house
CWE