VBZooM多个SQL注入漏洞

漏洞信息详情

VBZooM多个SQL注入漏洞

漏洞简介

VBZooM 1.11及之前版本存在多个SQL注入漏洞。远程攻击者可以借助对(1) ignore-pm.php, (2) sendmail.php, (3) reply.php或(4) sub-join.php的UserID参数,执行任意SQL指令。

漏洞公告

参考网址

来源: BID

名称: 18937

链接:http://www.securityfocus.com/bid/18937

来源: BUGTRAQ

名称: 20060711 VBZooM <=V1.11 ” ignore-pm.php” SQL Injection

链接:http://www.securityfocus.com/archive/1/archive/1/440145/100/0/threaded

来源: BUGTRAQ

名称: 20060711 VBZooM <=V1.11 ” reply.php” SQL Injection

链接:http://www.securityfocus.com/archive/1/archive/1/440141/100/0/threaded

来源: BUGTRAQ

名称: 20060711 VBZooM “sendmail.php” SQL Injection

链接:http://www.securityfocus.com/archive/1/archive/1/440133/100/0/threaded

来源: BUGTRAQ

名称: 20060711 VBZooM <=V1.11 “sub-join.php” SQL Injection

链接:http://www.securityfocus.com/archive/1/archive/1/440114/100/0/threaded

来源: XF

名称: vbzoom-userid-sql-injection(42254)

链接:http://xforce.iss.net/xforce/xfdb/42254

来源: BUGTRAQ

名称: 20080507 VBZooM <=V1.11 “reply.php” SQL Injection Vulnerability

链接:http://www.securityfocus.com/archive/1/archive/1/491770/100/0/threaded

来源: OSVDB

名称: 28254

链接:http://www.osvdb.org/28254

来源: SREASON

名称: 1244

链接:http://securityreason.com/securityalert/1244

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享