CVE-2005-4195

Multiple SQL injection vulnerabilities in Scout Portal Toolkit (SPT) 1.3.1 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the ParentId parameter in SPT--BrowseResources.php, (2) ResourceId parameter in SPT--FullRecord.php, (3) ResourceOffset parameter in SPT--Home.php, and (4) F_UserName and (5) F_Password in SPT--UserLogin.php. NOTE: it was later reported that vector 1 is also present in 1.4.0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:internet_scout:scout_portal_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:internet_scout:scout_portal_toolkit:1.3.0_beta:*:*:*:*:*:*:*
cpe:2.3:a:internet_scout_project:scout_portal_toolkit:1.4.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2005-12-13 11:03

Updated : 2024-02-28 10:42


NVD link : CVE-2005-4195

Mitre link : CVE-2005-4195

CVE.ORG link : CVE-2005-4195


JSON object : View

Products Affected

internet_scout

  • scout_portal_toolkit

internet_scout_project

  • scout_portal_toolkit
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')