SQL injection vulnerability in checkprofile.asp in (1) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (2) Novell ZENworks 6.2 SR1 and earlier, allows remote attackers to execute arbitrary SQL commands via the agentid parameter.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
SQL injection vulnerability in checkprofile.asp in (1) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (2) Novell ZENworks 6.2 SR1 and earlier, allows remote attackers to execute arbitrary SQL commands via the agentid parameter.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html | mailing-list x_refsource_FULLDISC |
http://www.securityfocus.com/archive/1/438710/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://secunia.com/advisories/20876 | third-party-advisory x_refsource_SECUNIA |
http://secunia.com/advisories/20878 | third-party-advisory x_refsource_SECUNIA |
http://www.securityfocus.com/bid/18715 | vdb-entry x_refsource_BID |
http://securityreason.com/securityalert/1200 | third-party-advisory x_refsource_SREASON |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27545 | vdb-entry x_refsource_XF |
http://www.vupen.com/english/advisories/2006/2596 | vdb-entry x_refsource_VUPEN |
http://www.vupen.com/english/advisories/2006/2595 | vdb-entry x_refsource_VUPEN |
http://securitytracker.com/id?1016405 | vdb-entry x_refsource_SECTRACK |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html | mailing-list x_refsource_FULLDISC x_transferred |
http://www.securityfocus.com/archive/1/438710/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://secunia.com/advisories/20876 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/20878 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/bid/18715 | vdb-entry x_refsource_BID x_transferred |
http://securityreason.com/securityalert/1200 | third-party-advisory x_refsource_SREASON x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27545 | vdb-entry x_refsource_XF x_transferred |
http://www.vupen.com/english/advisories/2006/2596 | vdb-entry x_refsource_VUPEN x_transferred |
http://www.vupen.com/english/advisories/2006/2595 | vdb-entry x_refsource_VUPEN x_transferred |
http://securitytracker.com/id?1016405 | vdb-entry x_refsource_SECTRACK x_transferred |
SQL injection vulnerability in checkprofile.asp in (1) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (2) Novell ZENworks 6.2 SR1 and earlier, allows remote attackers to execute arbitrary SQL commands via the agentid parameter.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |