SQL injection vulnerability in port/modifyportform.php in Open Source Security Information Management (OSSIM) 0.9.9 rc5 allows remote authenticated users to execute arbitrary SQL commands via the portname parameter, which is not properly handled by a validation regular expression.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/29046 - | |
References | () http://securityreason.com/securityalert/3689 - | |
References | () http://www.securityfocus.com/archive/1/488450/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/488617/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/27927 - Exploit | |
References | () https://www.exploit-db.com/exploits/5171 - |
Information
Published : 2008-02-22 23:44
Updated : 2024-11-21 00:43
NVD link : CVE-2008-0920
Mitre link : CVE-2008-0920
CVE.ORG link : CVE-2008-0920
JSON object : View
Products Affected
open_source_security_information_management
- os-sim
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')