SQL injection vulnerability in login.php in dwayner79 and Dominic Gamble Timesheet (aka Timesheet.php) 1.2.1 allows remote attackers to execute arbitrary SQL commands via the username parameter.
References
Configurations
History
21 Nov 2024, 00:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://secaware.blogspot.com/2006/09/timesheet-121-blind-sql-injection.html - | |
References | () http://secunia.com/advisories/21831 - | |
References | () http://securityreason.com/securityalert/1542 - | |
References | () http://www.securityfocus.com/archive/1/445603/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19856 - | |
References | () http://www.vupen.com/english/advisories/2006/3547 - |
Information
Published : 2006-09-12 16:07
Updated : 2024-11-21 00:16
NVD link : CVE-2006-4705
Mitre link : CVE-2006-4705
CVE.ORG link : CVE-2006-4705
JSON object : View
Products Affected
dominic_gamble
- timesheet.php
CWE