SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote attackers to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword parameter).
References
Configurations
History
20 Nov 2024, 23:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/secunia_research/2005-13/advisory/ - | |
References | () http://www.corsaire.com/advisories/c050323-001.txt - | |
References | () http://www.idefense.com/application/poi/display?id=268&type=vulnerabilities - Patch, Vendor Advisory | |
References | () http://www.ipswitch.com/forums/shwmessage.aspx?ForumID=20&MessageID=7699 - Patch, Vendor Advisory |
Information
Published : 2005-06-22 04:00
Updated : 2024-11-20 23:56
NVD link : CVE-2005-1250
Mitre link : CVE-2005-1250
CVE.ORG link : CVE-2005-1250
JSON object : View
Products Affected
ipswitch
- whatsup
CWE