Vulnerabilities > CVE-2006-3012 - Unspecified vulnerability in Eschew.Net PHPbannerexchange
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
SQL injection vulnerability in phpBannerExchange before 2.0 Update 6 allows remote attackers to execute arbitrary SQL commands via the (1) login parameter in (a) client/stats.php and (b) admin/stats.php, or the (2) pass parameter in client/stats.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Packetstorm
data source | https://packetstormsecurity.com/files/download/47616/rt-sa-2006-004.txt |
id | PACKETSTORM:47616 |
last seen | 2016-12-05 |
published | 2006-06-25 |
reporter | RedTeam Pentesting |
source | https://packetstormsecurity.com/files/47616/rt-sa-2006-004.txt.html |
title | rt-sa-2006-004.txt |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046954.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046954.html
- http://www.eschew.net/scripts/phpbe/2.0/releasenotes.php
- http://www.eschew.net/scripts/phpbe/2.0/releasenotes.php
- http://www.osvdb.org/26510
- http://www.osvdb.org/26510
- http://www.redteam-pentesting.de/advisories/rt-sa-2006-004.txt
- http://www.redteam-pentesting.de/advisories/rt-sa-2006-004.txt
- http://www.securityfocus.com/archive/1/437290/100/0/threaded
- http://www.securityfocus.com/archive/1/437290/100/0/threaded
- http://www.securityfocus.com/bid/18448
- http://www.securityfocus.com/bid/18448
- http://www.vupen.com/english/advisories/2006/2402
- http://www.vupen.com/english/advisories/2006/2402
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27195
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27195