Multiple "potential" SQL injection vulnerabilities in Utopia News Pro (UNP) 1.1.4 might allow remote attackers to execute arbitrary SQL commands via (1) the newsid parameter in editnews.php, (2) the catid and question parameters in faq.php, (3) the poster parameter in postnews.php, (4) the tempid parameter in templates.php, and (5) the userid and groupid parameters in users.php.
References
Configurations
History
21 Nov 2024, 00:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://glide.stanford.edu/yichen/research/sec.pdf - | |
References | () http://secunia.com/advisories/17988/ - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/21645 - Patch | |
References | () http://www.osvdb.org/21646 - Patch | |
References | () http://www.osvdb.org/21647 - Patch | |
References | () http://www.osvdb.org/21648 - Patch | |
References | () http://www.osvdb.org/21649 - Patch | |
References | () http://www.securityfocus.com/archive/1/419280/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/419487/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2005/2859 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/23564 - |
Information
Published : 2005-12-14 11:03
Updated : 2024-11-21 00:03
NVD link : CVE-2005-4223
Mitre link : CVE-2005-4223
CVE.ORG link : CVE-2005-4223
JSON object : View
Products Affected
utopia_software
- utopia_news_pro
CWE