CVE-2005-4225

N/A Unknown
Published: December 14, 2005 Modified: April 16, 2026
View on NVD

Description

Multiple "potential" SQL injection vulnerabilities in myBloggie 2.1.3 beta might allow remote attackers to execute arbitrary SQL commands via (1) the category parameter in add.php, (2) the cat_desc parameter in addcat.php, (3) the level and user parameters in adduser.php, (4) the post_id parameter in del.php, (5) the cat_id parameter in delcat.php, (6) the comment_id parameter in delcomment.php, (7) the id parameter in deluser.php, (8) the post_id and category parameter in edit.php, (9) the cat_id and cat_desc parameters in editcat.php, and (10) the id, level, and user parameters in edituser.php. NOTE: the username/login.php vector is already identified by CVE-2005-2838.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/18024/
Source: cve@mitre.org
Vendor Advisory
http://www.osvdb.org/21659
Source: cve@mitre.org
http://www.osvdb.org/21660
Source: cve@mitre.org
http://www.osvdb.org/21661
Source: cve@mitre.org
http://www.osvdb.org/21662
Source: cve@mitre.org
http://www.osvdb.org/21663
Source: cve@mitre.org
http://www.osvdb.org/21664
Source: cve@mitre.org
http://www.osvdb.org/21665
Source: cve@mitre.org
http://www.osvdb.org/21666
Source: cve@mitre.org
http://www.osvdb.org/21667
Source: cve@mitre.org
http://www.osvdb.org/21668
Source: cve@mitre.org
http://www.osvdb.org/21669
Source: cve@mitre.org
http://www.osvdb.org/21670
Source: cve@mitre.org
http://glide.stanford.edu/yichen/research/sec.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18024/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/21659
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21660
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21661
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21662
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21663
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21664
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21665
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21666
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21667
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21668
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21669
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/21670
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/419280/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/419487/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2862
Source: af854a3a-2127-422b-91ae-364da2661108

34 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.1%
84th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mywebland