SQL injection vulnerability in index.php in DSCounter 1.2, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For field (HTTP_X_FORWARDED_FOR environment variable) in an HTTP header.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://evuln.com/vulns/98/summary.html - Vendor Advisory | |
References | () http://secunia.com/advisories/19206 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/627 - | |
References | () http://securitytracker.com/id?1015756 - | |
References | () http://www.osvdb.org/23882 - | |
References | () http://www.securityfocus.com/archive/1/428807/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17112 - | |
References | () http://www.vupen.com/english/advisories/2006/0933 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25190 - |
Information
Published : 2006-03-14 19:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1234
Mitre link : CVE-2006-1234
CVE.ORG link : CVE-2006-1234
JSON object : View
Products Affected
dsportal
- dscounter
CWE