CVE-2005-2058
Published Jun 29, 2005
Last updated 8 years ago
Overview
- Description
- Multiple SQL injection vulnerabilities in Infopop UBB.Threads before 6.5.2 Beta allow remote attackers to execute arbitrary SQL commands via the Number parameter to (1) download.php, (2) modifypost.php, (3) mailthread.php, or (4) notifymod.php, (5) month or (6) year parameter to calendar.php, (7) message parameter to viewmessage.php, (8) main parameter to addfav.php, or (9) posted parameter to grabnext.php.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65952A65-78AC-4239-9D15-BA850AF64598" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DFF7A22-25CB-4D5E-BA1B-E10E407DA515" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "094040BF-4C59-4266-9683-76C59D332F16" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F02151FE-89D6-4FB5-82E2-50A2F1046341" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11E1B205-864C-4FAD-8891-12FBAC0E090F" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "047CFF77-7616-41A2-9879-EA0E33B4922C" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B321E2E-4AD3-4236-918A-F87804990FCC" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2232ED2E-0323-4DBB-8540-98BD52750025" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "895472F7-D0F8-4C6A-95C6-15963652ABEF" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "858FAA03-DD05-472D-9F67-3089262F5E82" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CAAB6C4-770C-4BC3-9D72-FDA7FD223CF0" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5D35A71-2F85-4F33-9480-81EE3EB0CEE4" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E52E29B-9461-4D62-8CCA-6F12DEB63EC6" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F82ADBA-67A1-47E8-8D09-21138BDE84AF" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD0DFCB9-3033-4509-BEDC-2B032524C4CD" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "124A5853-5C97-412B-B55B-7430B23565DC" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0ED5EF0-FF8B-4C4B-8157-FBCBF1B34C5D" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66D3CCE6-909B-46F4-AD8F-603E433C01D2" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "803A29EC-E63B-4F66-93E1-60698EE76011" }, { "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3159B6DF-CE17-490F-AA01-03E5D2EAC7B4" } ], "operator": "OR" } ] } ]