Description
Multiple SQL injection vulnerabilities in 20/20 DataShed (aka Real Estate Listing System) allow remote attackers to execute arbitrary SQL commands via the (1) itemID parameter to (a) f-email.asp, or the (2) peopleID and (2) sort_order parameters to (b) listings.asp, different vectors than CVE-2006-5955.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by laurent gaffie · textwebappsasp
https://www.exploit-db.com/exploits/29078
exploitdb
WRITEUP
VERIFIED
by laurent gaffie · textwebappsasp
https://www.exploit-db.com/exploits/29077
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/30402
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/21156
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/451962/100/0/threaded
Exploit, Vendor Advisory, URL Repurposed x_refsource_misc
http://s-a-p.ca/index.php?page=OurAdvisories&id=40
Scores
EPSS
0.0139
EPSS Percentile
80.5%
Details
Status
published
Products (1)
20_20_applications/20_20_datashed
1.0
Published
Nov 22, 2006
Tracked Since
Feb 18, 2026