Multiple SQL injection vulnerabilities in MySQL Eventum 1.5.5 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) isCorrectPassword or (2) userExist function in class.auth.php, getCustomFieldReport function in (4) custom_fields.php, (5) custom_fields_graph.php, or (6) class.report.php, or the insert function in (7) releases.php or (8) class.release.php.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Multiple SQL injection vulnerabilities in MySQL Eventum 1.5.5 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) isCorrectPassword or (2) userExist function in class.auth.php, getCustomFieldReport function in (4) custom_fields.php, (5) custom_fields_graph.php, or (6) class.report.php, or the insert function in (7) releases.php or (8) class.release.php.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.osvdb.org/18404 | vdb-entry x_refsource_OSVDB |
http://www.vupen.com/english/advisories/2005/1287 | vdb-entry x_refsource_VUPEN |
http://secunia.com/advisories/16304 | third-party-advisory x_refsource_SECUNIA |
http://www.osvdb.org/18403 | vdb-entry x_refsource_OSVDB |
http://www.osvdb.org/18405 | vdb-entry x_refsource_OSVDB |
http://securitytracker.com/id?1014603 | vdb-entry x_refsource_SECTRACK |
http://lists.mysql.com/eventum-users/2072 | x_refsource_CONFIRM |
http://marc.info/?l=bugtraq&m=112292193807958&w=2 | mailing-list x_refsource_BUGTRAQ |
http://www.gulftech.org/?node=research&article_id=00093-07312005 | x_refsource_MISC |
http://www.securityfocus.com/bid/14437 | vdb-entry x_refsource_BID |
http://www.osvdb.org/18406 | vdb-entry x_refsource_OSVDB |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.osvdb.org/18404 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.vupen.com/english/advisories/2005/1287 | vdb-entry x_refsource_VUPEN x_transferred |
http://secunia.com/advisories/16304 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.osvdb.org/18403 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.osvdb.org/18405 | vdb-entry x_refsource_OSVDB x_transferred |
http://securitytracker.com/id?1014603 | vdb-entry x_refsource_SECTRACK x_transferred |
http://lists.mysql.com/eventum-users/2072 | x_refsource_CONFIRM x_transferred |
http://marc.info/?l=bugtraq&m=112292193807958&w=2 | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.gulftech.org/?node=research&article_id=00093-07312005 | x_refsource_MISC x_transferred |
http://www.securityfocus.com/bid/14437 | vdb-entry x_refsource_BID x_transferred |
http://www.osvdb.org/18406 | vdb-entry x_refsource_OSVDB x_transferred |
Multiple SQL injection vulnerabilities in MySQL Eventum 1.5.5 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) isCorrectPassword or (2) userExist function in class.auth.php, getCustomFieldReport function in (4) custom_fields.php, (5) custom_fields_graph.php, or (6) class.report.php, or the insert function in (7) releases.php or (8) class.release.php.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 6.4 | MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |