Multiple SQL injection vulnerabilities in Scout Portal Toolkit (SPT) 1.3.1 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the ParentId parameter in SPT--BrowseResources.php, (2) ResourceId parameter in SPT--FullRecord.php, (3) ResourceOffset parameter in SPT--Home.php, and (4) F_UserName and (5) F_Password in SPT--UserLogin.php. NOTE: it was later reported that vector 1 is also present in 1.4.0.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2005-12-13 11:03
Updated : 2024-02-04 16:52
NVD link : CVE-2005-4195
Mitre link : CVE-2005-4195
CVE.ORG link : CVE-2005-4195
JSON object : View
Products Affected
internet_scout
- scout_portal_toolkit
internet_scout_project
- scout_portal_toolkit
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')