CVE-2006-4857

ClickTech ClickBlog 2.0 - SQL Injection

Title source: llm
STIX 2.1

Description

SQL injection vulnerability in default.asp (aka the login page) in ClickTech ClickBlog 2.0 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) form_codeword (aka the Password field) parameters.

Exploits (1)

exploitdb WORKING POC VERIFIED
by ajann · textwebappsasp
https://www.exploit-db.com/exploits/28577

References (6)

Core 6
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/21980
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/1599
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/3662
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/446074/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/20033
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/28964

Scores

EPSS 0.0090
EPSS Percentile 75.7%

Details

Status published
Products (1)
clicktech/clickblog 2.0
Published Sep 19, 2006
Tracked Since Feb 18, 2026