Vulnerability Details : CVE-2006-1353
Multiple SQL injection vulnerabilities in ASPPortal 3.1.1 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the downloadid parameter in download_click.asp and (2) content_ID parameter in news/News_Item.asp; authenticated administrators can also conduct attacks via (3) user_id parameter to users/add_edit_user.asp, (4) bannerid parameter to banner_adds/banner_add_edit.asp, (5) cat_id parameter to categories/add_edit_cat.asp, (6) Content_ID parameter to News/add_edit_news.asp, (7) download_id parameter to downloads/add_edit_download.asp, (8) Poll_ID parameter to poll/add_edit_poll.asp, (9) contactid parameter to contactus/contactus_add_edit.asp, (10) sortby parameter to poll/poll_list.asp, and (11) unspecified inputs to downloads/add_edit_download.asp.
Vulnerability category: Sql Injection
Products affected by CVE-2006-1353
- cpe:2.3:a:aspportal:aspportal:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:aspportal:aspportal:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:aspportal:aspportal:3.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1353
0.98%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1353
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-1353
-
http://www.securityfocus.com/bid/17174
-
https://www.exploit-db.com/exploits/1597
-
http://securityreason.com/securityalert/608
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25346
-
http://www.securityfocus.com/archive/1/428615/100/0/threaded
-
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1402.html
-
http://www.vupen.com/english/advisories/2006/1014
-
http://www.nukedx.com/?viewdoc=21
Exploit;Vendor Advisory
-
http://www.securityfocus.com/archive/1/428355/100/0/threaded
-
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1431.html
Jump to