Multiple SQL injection vulnerabilities in Active Auction House allow remote attackers to execute arbitrary SQL commands via the (1) catid, (2) SortDir, or (3) Sortby parameter to default.asp, (4) itemID parameter to ItemInfo.asp, or (5) Email field to sendpassword.asp.
References
| Link | Resource |
|---|---|
| http://digitalparadox.org/advisories/aass.txt | |
| http://www.securityfocus.com/bid/13032 | Exploit Vendor Advisory |
| http://www.securityfocus.com/bid/13034 | Exploit Vendor Advisory |
| http://www.securityfocus.com/bid/13035 | Vendor Advisory |
| http://www.securitytracker.com/alerts/2005/Apr/1013649.html | Vendor Advisory |
| http://secunia.com/advisories/14839 | Vendor Advisory |
| http://www.osvdb.org/15281 | |
| http://www.osvdb.org/15282 | |
| http://www.osvdb.org/15283 | |
| http://marc.info/?l=bugtraq&m=111280834000432&w=2 | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/19977 |
Configurations
Information
Published : 2005-04-05 21:00
Updated : 2017-07-10 18:32
NVD link : CVE-2005-1029
Mitre link : CVE-2005-1029
JSON object : View
CWE
Products Affected
active_web_softwares
- active_auction_house


