The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.
References
Link Providers
http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html cve-icon cve-icon
http://secunia.com/advisories/17418 cve-icon cve-icon
http://secunia.com/advisories/18233 cve-icon cve-icon
http://secunia.com/advisories/18254 cve-icon cve-icon
http://secunia.com/advisories/18260 cve-icon cve-icon
http://secunia.com/advisories/18267 cve-icon cve-icon
http://secunia.com/advisories/18276 cve-icon cve-icon
http://secunia.com/advisories/18720 cve-icon cve-icon
http://secunia.com/advisories/19555 cve-icon cve-icon
http://secunia.com/advisories/19563 cve-icon cve-icon
http://secunia.com/advisories/19590 cve-icon cve-icon
http://secunia.com/advisories/19591 cve-icon cve-icon
http://secunia.com/advisories/19600 cve-icon cve-icon
http://secunia.com/advisories/19691 cve-icon cve-icon
http://secunia.com/advisories/19699 cve-icon cve-icon
http://secunia.com/advisories/24954 cve-icon cve-icon
http://secunia.com/secunia_research/2005-64/advisory/ cve-icon cve-icon
http://securityreason.com/securityalert/713 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1029 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1030 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1031 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml cve-icon cve-icon
http://www.maxdev.com/Article550.phtml cve-icon cve-icon
http://www.osvdb.org/22290 cve-icon cve-icon
http://www.securityfocus.com/archive/1/423784/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/430448/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/466171/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/16187 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0101 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0102 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0103 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0104 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0105 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0370 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0447 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1304 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1305 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1419 cve-icon cve-icon
http://www.xaraya.com/index.php/news/569 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/24051 cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2006-01-09T23:00:00

Updated: 2024-08-07T16:25:33.856Z

Reserved: 2006-01-09T00:00:00

Link: CVE-2006-0146

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-01-09T23:03:00.000

Modified: 2024-11-21T00:05:45.310

Link: CVE-2006-0146

cve-icon Redhat

No data.