7.5
CVSSv2

CVE-2005-4380

Published: 20/12/2005 Updated: 20/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 775
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in Bitweaver 1.1 and 1.1.1 beta allow remote malicious users to execute arbitrary SQL commands via the (1) sort_mode parameter to (a) fisheye/list_galleries.php, (b) messages/message_box.php, and (c) users/my.php; the (2) post_id parameter to (d) blogs/view_post.php; and the (3) blog_id parameter to (e) blogs/view.php, which are not properly cleansed by the convert_sortmode function in kernel/BitDb.php.

Vulnerable Product Search on Vulmon Subscribe to Product

bitweaver bitweaver 1.1

bitweaver bitweaver 1.1.1_beta

Exploits

source: wwwsecurityfocuscom/bid/15962/info bitweaver is prone to multiple input validation vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, th ...
source: wwwsecurityfocuscom/bid/15962/info bitweaver is prone to multiple input validation vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data ...
source: wwwsecurityfocuscom/bid/15962/info bitweaver is prone to multiple input validation vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, ...
source: wwwsecurityfocuscom/bid/15962/info bitweaver is prone to multiple input validation vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of ...
source: wwwsecurityfocuscom/bid/15962/info bitweaver is prone to multiple input validation vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of da ...