CVE-2006-1426

Pixel Motion Blog - SQL Injection

Title source: llm
STIX 2.1

Description

Multiple SQL injection vulnerabilities in Pixel Motion Blog allow remote attackers to execute arbitrary SQL commands via the (1) date parameter in index.php or bypass authentication via the (2) password parameter in admin/index.php.

Exploits (2)

exploitdb WRITEUP VERIFIED
by DaBDouB-MoSiKaR · textwebappsphp
https://www.exploit-db.com/exploits/27484
exploitdb WORKING POC VERIFIED
by DaBDouB-MoSiKaR · textwebappsphp
https://www.exploit-db.com/exploits/27483

References (8)

Core 8
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/428964/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25478
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/24169
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/17260
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25481
Exploit, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19421
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1135
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/24168

Scores

EPSS 0.0208
EPSS Percentile 84.0%

Details

Status published
Products (1)
pixel_motion/pixel_motion_blog
Published Mar 28, 2006
Tracked Since Feb 18, 2026