| Title | E-Commerce Scripts Shopping Cart Script の admin.aspx における SQL インジェクションの脆弱性 |
|---|---|
| Summary | E-Commerce Scripts Shopping Cart Script、Multi-Vendor E-Shop Script および Auction Script の admin.aspx には、SQL インジェクションの脆弱性が存在します。 |
| Possible impacts | 第三者により、(1) EmailAdd (ユーザ名) および (2) Pass (パスワード) パラメータを介して、任意の SQL コマンドを実行される可能性があります。 |
| Solution | 参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 1, 2007, midnight |
| Registration Date | June 26, 2012, 3:54 p.m. |
| Last Update | June 26, 2012, 3:54 p.m. |
| CVSS2.0 : 危険 | |
| Score | 10 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| e-commerce solutions |
| auction script |
| multi-vendor e-shop script |
| shopping cart script |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2012年06月26日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | Multiple SQL injection vulnerabilities in admin.aspx in E-Commerce Scripts Shopping Cart Script, Multi-Vendor E-Shop Script, and Auction Script allow remote attackers to execute arbitrary SQL commands via the (1) EmailAdd (Username) and (2) Pass (password) parameters. NOTE: some of these details are obtained from third party information. |
|---|---|
| Summary | Múltiples vulnerabilidades de inyección SQL en admin.aspx de E-Commerce Scripts Shopping Cart Script, Multi-Vendor E-Shop Script, y Auction Script permite a atacantes remotos ejecutar comandos sql de su elección mediante los parámetros (1) EmailAdd (Username) y (2) Pass (password). NOTA: algunos de estos detalles se han obtenido de información de terceros. |
| Publication Date | Aug. 2, 2007, 1:17 a.m. |
| Registration Date | Jan. 29, 2021, 2:17 p.m. |
| Last Update | April 23, 2026, 9:35 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:e-commerce_solutions:auction_script:*:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:e-commerce_solutions:multi-vendor_e-shop_script:*:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:e-commerce_solutions:shopping_cart_script:*:*:*:*:*:*:*:* | |||||