Description
SQL injection vulnerability in Softbiz FAQ Script 1.1 and earler allows remote attackers to execute arbitrary SQL commands via the id parameter in (1) index.php, (2) faq_qanda.php, (3) refer_friend.php, (4) print_article.php, or (5) add_comment.php.
Exploits (5)
References (8)
Core 8
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15653
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17809
Third Party Advisory x_refsource_misc
http://pridels0.blogspot.com/2005/11/softbiz-faq-script-multiple-sql-vuln.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21261
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21258
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21260
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21257
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21259
Scores
EPSS
0.0515
EPSS Percentile
89.9%
Details
Status
published
Products (2)
softbiz/faq
< 1.1
softbizscripts/faq_script
< 1.1
Published
Dec 01, 2005
Tracked Since
Feb 18, 2026