Multiple SQL injection vulnerabilities in FactoSystem CMS allows remote attackers to perform unauthorized database actions via (1) the authornumber parameter in author.asp, (2) the discussblurbid parameter in discuss.asp, (3) the name parameter in holdcomment.asp, and (4) the email parameter in holdcomment.asp.
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/1/290021 | Exploit Vendor Advisory |
http://www.iss.net/security_center/static/10000.php | Vendor Advisory |
http://www.securityfocus.com/bid/5600 | Exploit Vendor Advisory |
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0097.html | |
http://sourceforge.net/tracker/index.php?func=detail&aid=602711&group_id=12668&atid=112668 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2003-04-01 21:00
Updated : 2008-09-05 13:30
NVD link : CVE-2002-1499
Mitre link : CVE-2002-1499
JSON object : View
CWE
Products Affected
factosystem
- factosystem_weblog