Multiple SQL injection vulnerabilities in Eskolar CMS 0.9.0.0 allow remote attackers to execute arbitrary SQL commands via the (1) gr_1_id, (2) gr_2_id, (3) gr_3_id, and (4) doc_id parameters in (a) index.php; the (5) uid and (6) pwd parameters in (b) php/esa.php; and possibly other vectors related to files in php/lib/ including (c) del.php, (d) download_backup.php, (e) navig.php, (f) restore.php, (g) set_12.php, (h) set_14.php, and (i) upd_doc.php.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/2032 | exploit |
http://www.osvdb.org/27399 | vdb entry |
http://www.securityfocus.com/bid/19045 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27808 | vdb entry |
http://secunia.com/advisories/21101 | exploit third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27809 | vdb entry |
http://www.vupen.com/english/advisories/2006/2869 | vdb entry |
http://www.osvdb.org/27396 | vdb entry |
http://www.osvdb.org/27392 | vdb entry |
http://www.osvdb.org/27395 | vdb entry |
http://www.osvdb.org/27393 | vdb entry |
http://www.osvdb.org/27397 | vdb entry |
http://www.osvdb.org/27391 | vdb entry |
http://www.osvdb.org/27398 | vdb entry |
http://www.osvdb.org/27394 | vdb entry |