Multiple SQL injection vulnerabilities in FactoSystem CMS allows remote attackers to perform unauthorized database actions via (1) the authornumber parameter in author.asp, (2) the discussblurbid parameter in discuss.asp, (3) the name parameter in holdcomment.asp, and (4) the email parameter in holdcomment.asp.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Factosystem_weblog | Factosystem | 0.9b (including) | 0.9b (including) |
Factosystem_weblog | Factosystem | 1.0_beta (including) | 1.0_beta (including) |
Factosystem_weblog | Factosystem | 1.1_beta (including) | 1.1_beta (including) |