Description
Multiple SQL injection vulnerabilities in Web4Future eDating Professional 5 allow remote attackers to execute arbitrary SQL commands via the (1) s, (2) pg, and (3) sortb parameters to (a) index.php; (4) cid parameter to (b) gift.php and (c) fq.php; and (5) cat parameter to (d) articles.php.
Exploits (4)
References (8)
Core 8
Core References
Third Party Advisory x_refsource_misc
http://pridels0.blogspot.com/2005/12/web4future-edating-professional-v5-sql.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17879
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2005/2734
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21419
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21418
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15715
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21421
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21420
Scores
EPSS
0.0083
EPSS Percentile
74.7%
Details
Status
published
Products (1)
web4future/edating_professional
5
Published
Dec 06, 2005
Tracked Since
Feb 18, 2026