Vulnerability Description
Multiple SQL injection vulnerabilities in default.asp in Xenis.creator CMS allow remote attackers to execute arbitrary SQL commands via the (1) nav, (2) s, or (3) print parameters.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xenis | Xenis.Creator Cms | All versions |
References
- http://marc.info/?l=bugtraq&m=116266150514762&w=2
- http://marc.info/?l=bugtraq&m=116267021732120&w=2
- http://secunia.com/advisories/22716
- http://securitytracker.com/id?1017162Vendor Advisory
- http://www.majorsecurity.de/index_2.php?major_rls=major_rls31
- http://www.securityfocus.com/bid/20908
- http://www.vupen.com/english/advisories/2006/4470
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30017
- http://marc.info/?l=bugtraq&m=116266150514762&w=2
- http://marc.info/?l=bugtraq&m=116267021732120&w=2
- http://secunia.com/advisories/22716
- http://securitytracker.com/id?1017162Vendor Advisory
- http://www.majorsecurity.de/index_2.php?major_rls=major_rls31
- http://www.securityfocus.com/bid/20908
- http://www.vupen.com/english/advisories/2006/4470
FAQ
What is CVE-2006-5797?
CVE-2006-5797 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple SQL injection vulnerabilities in default.asp in Xenis.creator CMS allow remote attackers to execute arbitrary SQL commands via the (1) nav, (2) s, or (3) print parameters.
How severe is CVE-2006-5797?
CVE-2006-5797 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5797?
Check the references section above for vendor advisories and patch information. Affected products include: Xenis Xenis.Creator Cms.