CVE-2008-2087 – Softbiz Web Host Directory Script - 'host_id' SQL Injection
https://notcve.org/view.php?id=CVE-2008-2087
SQL injection vulnerability in search_result.php in Softbiz Web Host Directory Script, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the host_id parameter, a different vector than CVE-2005-3817. Vulnerabilidad de inyección SQL en search_result.php de Softbiz Web Host Directory Script, cuando magic_quotes_gpc está deshabilitado, permite a atacantes remotos ejecutar comandos SQL de su elección mediante el parámetro host_id, un vector distinto a CVE-2005-3817. • https://www.exploit-db.com/exploits/5517 http://advisories.echo.or.id/adv/adv89-K-159-2008.txt http://secunia.com/advisories/29983 http://securityreason.com/securityalert/3855 http://www.securityfocus.com/archive/1/491396/100/0/threaded http://www.securityfocus.com/bid/28971 https://exchange.xforce.ibmcloud.com/vulnerabilities/42096 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2005-3817 – SoftBiz Web Hosting Directory Script 1.1 - 'browsecats.php?cid' SQL Injection
https://notcve.org/view.php?id=CVE-2005-3817
Multiple SQL injection vulnerabilities in Softbiz Web Host Directory Script 1.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) cid parameter in search_result.php, (2) sbres_id parameter in review.php, (3) cid parameter in browsecats.php, (4) h_id parameter in email.php, and (5) an unspecified parameter to the search module. • https://www.exploit-db.com/exploits/26582 https://www.exploit-db.com/exploits/26583 https://www.exploit-db.com/exploits/26581 https://www.exploit-db.com/exploits/26580 https://www.exploit-db.com/exploits/12439 http://pridels0.blogspot.com/2005/11/web-host-directory-script-multiple.html http://secunia.com/advisories/17724 http://www.osvdb.org/21079 http://www.osvdb.org/21080 http://www.osvdb.org/21081 http://www.osvdb.org/21082 http://www.osvdb.org/2108 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •