CVE-2005-1562
Published May 11, 2005
Last updated 7 years ago
Overview
- Description
- Multiple SQL injection vulnerabilities in MaxWebPortal 1.3.5 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) fpassword parameter to inc_functions.asp, (2) txtAddress, (3) message, or (4) subject parameter to post_info.asp, (5) andor parameter to search.asp, (6) verkey parameter to pop_profile.asp, or (7) Remove or (8) Delete parameter to pm_delete2.asp.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:maxwebportal:maxwebportal:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD43E028-53FC-475E-8E62-5660E2E93265" }, { "criteria": "cpe:2.3:a:maxwebportal:maxwebportal:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DFAB9F0-D654-4ADE-A54A-C3FC7675CC1E" }, { "criteria": "cpe:2.3:a:maxwebportal:maxwebportal:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33D88D67-858C-4A64-9EAC-C9634183F696" }, { "criteria": "cpe:2.3:a:maxwebportal:maxwebportal:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B875DE4-9AEC-4172-9E2D-60651F846B9B" }, { "criteria": "cpe:2.3:a:maxwebportal:maxwebportal:1.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "448A15D5-BB55-4B4D-8751-829A00E644B1" }, { "criteria": "cpe:2.3:a:maxwebportal:maxwebportal:1.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B22E55F5-AA5E-4F68-ACC2-F170D811FA08" }, { "criteria": "cpe:2.3:a:maxwebportal:maxwebportal:1.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CC20472-1004-43E0-8F91-4697824FA769" }, { "criteria": "cpe:2.3:a:maxwebportal:maxwebportal:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC344628-1C14-45FE-A073-25ADCE6A0AA8" } ], "operator": "OR" } ] } ]