Description
CyberBuild - login.asp?sessionid SQL Injection
{"id": "EXPLOITPACK:98E138F2B4788DEBFBD1423B079E870C", "vendorId": null, "type": "exploitpack", "bulletinFamily": "exploit", "title": "CyberBuild - login.asp?sessionid SQL Injection", "description": "\nCyberBuild - login.asp?sessionid SQL Injection", "published": "2006-05-03T00:00:00", "modified": "2006-05-03T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "", "reporter": "r0t", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2020-04-01T20:39:52", "viewCount": 5, "enchantments": {"dependencies": {}, "score": {"value": -0.0, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.0}, "_state": {"dependencies": 1678960072, "score": 1684000228, "epss": 1678962009}, "_internal": {"score_hash": "385bd76392099377ca963b5b0d4e02cc"}, "sourceData": "source: https://www.securityfocus.com/bid/17829/info\n\nCyberBuild is prone to multiple input-validation vulnerabilities. The issues include cross-site scripting and SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. \n\nA successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.\n\nhttp://www.example.com/login.asp?SessionID=[SQL]", "affectedSoftware": [], "appercut": {}, "exploitpack": {"type": "webapps", "platform": "asp"}, "hackapp": {}, "toolHref": "", "w3af": {}}
{}