CVE-2005-4155

registration.PHP in ATutor 1.5.1 pl2 allows remote attackers to execute arbitrary SQL commands via an e-mail address that ends in a NULL character, which bypasses the PHP regular expression check. NOTE: it is possible that this is actually a bug in PHP code, in which case this should not be treated as a vulnerability in ATutor.
Configurations

Configuration 1 (hide)

cpe:2.3:a:adaptive_technology_resource_centre:atutor:1.5.1_pl2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:03

Type Values Removed Values Added
References () http://rgod.altervista.org/atutor151pl2.html - Exploit, Vendor Advisory () http://rgod.altervista.org/atutor151pl2.html - Exploit, Vendor Advisory
References () http://securitytracker.com/alerts/2005/Nov/1015166.html - () http://securitytracker.com/alerts/2005/Nov/1015166.html -
References () http://www.osvdb.org/20851 - () http://www.osvdb.org/20851 -
References () http://www.securityfocus.com/bid/15355/ - Exploit () http://www.securityfocus.com/bid/15355/ - Exploit

Information

Published : 2005-12-11 02:03

Updated : 2024-11-21 00:03


NVD link : CVE-2005-4155

Mitre link : CVE-2005-4155

CVE.ORG link : CVE-2005-4155


JSON object : View

Products Affected

adaptive_technology_resource_centre

  • atutor