Multiple SQL injection vulnerabilities in TorrentTrader Classic 1.09 allow remote authenticated users to execute arbitrary SQL commands via (1) the origmsg parameter to account-inbox.php; the categ parameter to (2) delreq.php and (3) admin-delreq.php; (4) the choice parameter to index.php; (5) the id parameter to modrules.php in an edited (aka edit) action; the (6) user, (7) torrent, (8) forumid, and (9) forumpost parameters to report.php; (10) the delmp parameter to take-deletepm.php; (11) the delreport parameter to takedelreport.php; (12) the delreq parameter to takedelreq.php; (13) the clases parameter to takestaffmess.php; and (14) the warndisable parameter to takewarndisable.php; and allow remote attackers to execute arbitrary SQL commands via (15) the wherecatin parameter to browse.php, (16) the limit parameter to today.php, and (17) the where parameter to torrents-details.php.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51142 | vdb-entry x_refsource_XF |
| http://secunia.com/advisories/35456 | third-party-advisory x_refsource_SECUNIA |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51181 | vdb-entry x_refsource_XF |
| http://www.securityfocus.com/bid/35369 | vdb-entry x_refsource_BID |
| https://www.exploit-db.com/exploits/8958 | exploit x_refsource_EXPLOIT-DB |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51179 | vdb-entry x_refsource_XF |
| http://www.securityfocus.com/archive/1/504294/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://www.waraxe.us/advisory-74.html | x_refsource_MISC |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51178 | vdb-entry x_refsource_XF |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51180 | vdb-entry x_refsource_XF |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51143 | vdb-entry x_refsource_XF |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51142 | vdb-entry x_refsource_XF x_transferred |
| http://secunia.com/advisories/35456 | third-party-advisory x_refsource_SECUNIA x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51181 | vdb-entry x_refsource_XF x_transferred |
| http://www.securityfocus.com/bid/35369 | vdb-entry x_refsource_BID x_transferred |
| https://www.exploit-db.com/exploits/8958 | exploit x_refsource_EXPLOIT-DB x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51179 | vdb-entry x_refsource_XF x_transferred |
| http://www.securityfocus.com/archive/1/504294/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
| http://www.waraxe.us/advisory-74.html | x_refsource_MISC x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51178 | vdb-entry x_refsource_XF x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51180 | vdb-entry x_refsource_XF x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/51143 | vdb-entry x_refsource_XF x_transferred |