{"cve": [{"lastseen": "2021-02-02T05:24:37", "description": "Multiple SQL injection vulnerabilities in Loki download manager 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) password field to default.asp or (2) cat parameter to catinfo.asp.", "edition": 3, "cvss3": {}, "published": "2005-06-08T04:00:00", "title": "CVE-2005-1943", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-1943"], "modified": "2016-10-18T03:23:00", "cpe": [], "id": "CVE-2005-1943", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1943", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": []}], "osvdb": [{"lastseen": "2017-04-28T13:20:13", "bulletinFamily": "software", "cvelist": ["CVE-2005-1943"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nSecurity Tracker: 1014147\n[Secunia Advisory ID:15633](https://secuniaresearch.flexerasoftware.com/advisories/15633/)\n[Related OSVDB ID: 17222](https://vulners.com/osvdb/OSVDB:17222)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-06/0043.html\n[CVE-2005-1943](https://vulners.com/cve/CVE-2005-1943)\nBugtraq ID: 13898\n", "modified": "2005-06-08T04:59:11", "published": "2005-06-08T04:59:11", "href": "https://vulners.com/osvdb/OSVDB:17221", "id": "OSVDB:17221", "title": "Loki Download Manager default.asp Password Field SQL Injection", "type": "osvdb", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "exploitdb": [{"lastseen": "2016-02-03T02:12:39", "description": "Loki Download Manager 2.0 Default.ASP SQL Injection Vulnerability. CVE-2005-1943. Webapps exploit for asp platform", "published": "2005-06-08T00:00:00", "type": "exploitdb", "title": "Loki Download Manager 2.0 Default.ASP SQL Injection Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-1943"], "modified": "2005-06-08T00:00:00", "id": "EDB-ID:25804", "href": "https://www.exploit-db.com/exploits/25804/", "sourceData": "source: http://www.securityfocus.com/bid/13898/info\r\n\r\nLoki Download Manager is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input to the 'default.asp' script before using it in an SQL query.\r\n\r\nSuccessful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. \r\n\r\nThe following proof of concept is available:\r\nuser: anyuser\r\npass: 'or''=' ", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/25804/"}, {"lastseen": "2016-02-03T02:12:47", "description": "Loki Download Manager 2.0 Catinfo.ASP SQL Injection Vulnerability. CVE-2005-1943. Webapps exploit for asp platform", "published": "2005-06-08T00:00:00", "type": "exploitdb", "title": "Loki Download Manager 2.0 Catinfo.ASP SQL Injection Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-1943"], "modified": "2005-06-08T00:00:00", "id": "EDB-ID:25805", "href": "https://www.exploit-db.com/exploits/25805/", "sourceData": "source: http://www.securityfocus.com/bid/13900/info\r\n\r\nLoki Download Manager is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input to the 'catinfo.asp' script before using it in an SQL query.\r\n\r\nSuccessful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. \r\n\r\nhttp://www.example.com/downmancv/catinfo.asp?cat=' union select null,null,user,null,null,null,null,null,pass,null,null,null,null,null FROM tblAdm' ", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/25805/"}]}