CVE-2005-1029

Active Auction House - SQL Injection

Title source: llm
STIX 2.1

Description

Multiple SQL injection vulnerabilities in Active Auction House allow remote attackers to execute arbitrary SQL commands via the (1) catid, (2) SortDir, or (3) Sortby parameter to default.asp, (4) itemID parameter to ItemInfo.asp, or (5) Email field to sendpassword.asp.

Exploits (2)

exploitdb WRITEUP VERIFIED
by Dcrab · textwebappsasp
https://www.exploit-db.com/exploits/25347
exploitdb WRITEUP VERIFIED
by Dcrab · textwebappsasp
https://www.exploit-db.com/exploits/25346

References (11)

Core 11
Core References
Exploit, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/13034
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/19977
Vendor Advisory vdb-entry x_refsource_sectrack
http://www.securitytracker.com/alerts/2005/Apr/1013649.html
Exploit, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/13032
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/15283
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/15281
Various Sources x_refsource_misc
http://digitalparadox.org/advisories/aass.txt
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111280834000432&w=2
Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/13035
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/14839
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/15282

Scores

EPSS 0.0448
EPSS Percentile 89.2%

Details

Status published
Products (1)
active_web_softwares/active_auction_house 7.1
Published Apr 06, 2005
Tracked Since Feb 18, 2026