Multiple SQL injection vulnerabilities in Pentacle In-Out Board 3.0 and earlier allow remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) newsid parameter to newsdetailsview.asp and (2) password parameter to login.asp.
References
| Link | Resource |
|---|---|
| http://www.nukedx.com/?viewdoc=13 | Exploit Vendor Advisory |
| http://www.nukedx.com/?viewdoc=14 | Exploit Vendor Advisory |
| http://www.securityfocus.com/bid/16818 | Exploit Vendor Advisory |
| http://securitytracker.com/id?1015682 | Exploit Vendor Advisory |
| http://secunia.com/advisories/19024 | Exploit Vendor Advisory |
| http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042525.html | |
| http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042524.html | |
| http://www.vupen.com/english/advisories/2006/0749 | |
| http://www.securityfocus.com/archive/1/426075/100/0/threaded | |
| http://www.securityfocus.com/archive/1/426074/100/0/threaded |
Configurations
Information
Published : 2006-03-06 12:06
Updated : 2018-10-18 09:30
NVD link : CVE-2006-1000
Mitre link : CVE-2006-1000
JSON object : View
CWE
Products Affected
g2soft
- pentacle_in-out_board


