Multiple SQL injection vulnerabilities in MySQL Eventum 1.5.5 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) isCorrectPassword or (2) userExist function in class.auth.php, getCustomFieldReport function in (4) custom_fields.php, (5) custom_fields_graph.php, or (6) class.report.php, or the insert function in (7) releases.php or (8) class.release.php.
References
Link | Resource |
---|---|
http://www.gulftech.org/?node=research&article_id=00093-07312005 | Exploit |
http://lists.mysql.com/eventum-users/2072 | Patch |
http://www.securityfocus.com/bid/14437 | Exploit |
http://www.osvdb.org/18403 | Exploit Patch |
http://www.osvdb.org/18404 | Exploit Patch |
http://www.osvdb.org/18405 | Exploit Patch |
http://www.osvdb.org/18406 | Exploit Patch |
http://securitytracker.com/id?1014603 | Exploit Patch |
http://secunia.com/advisories/16304 | Patch Vendor Advisory |
http://www.vupen.com/english/advisories/2005/1287 | |
http://marc.info/?l=bugtraq&m=112292193807958&w=2 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-12-30 21:00
Updated : 2016-10-17 20:27
NVD link : CVE-2005-2468
Mitre link : CVE-2005-2468
JSON object : View
CWE
Products Affected
mysql
- eventum