CVE-2011-1653

Multiple SQL injection vulnerabilities in the Unified Network Control (UNC) Server in CA Total Defense (TD) r12 before SE2 allow remote attackers to execute arbitrary SQL commands via vectors involving the (1) UnAssignFunctionalRoles, (2) UnassignAdminRoles, (3) DeleteFilter, (4) NonAssignedUserList, (5) DeleteReportLayout, (6) DeleteReports, and (7) RegenerateReport stored procedures.
References
Link Resource
http://secunia.com/advisories/44097 Vendor Advisory
http://securityreason.com/securityalert/8403
http://securitytracker.com/id?1025353
http://www.securityfocus.com/archive/1/517489/100/0/threaded
http://www.securityfocus.com/archive/1/517490/100/0/threaded
http://www.securityfocus.com/archive/1/517491/100/0/threaded
http://www.securityfocus.com/archive/1/517493/100/0/threaded
http://www.securityfocus.com/archive/1/517494/100/0/threaded
http://www.securityfocus.com/archive/1/517496/100/0/threaded
http://www.securityfocus.com/archive/1/517497/100/0/threaded
http://www.securityfocus.com/archive/1/517498/100/0/threaded
http://www.securityfocus.com/bid/47355
http://www.vupen.com/english/advisories/2011/0977 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-11-128/
http://www.zerodayinitiative.com/advisories/ZDI-11-129/
http://www.zerodayinitiative.com/advisories/ZDI-11-130/
http://www.zerodayinitiative.com/advisories/ZDI-11-131/
http://www.zerodayinitiative.com/advisories/ZDI-11-132/
http://www.zerodayinitiative.com/advisories/ZDI-11-133/
http://www.zerodayinitiative.com/advisories/ZDI-11-134/
https://exchange.xforce.ibmcloud.com/vulnerabilities/66725
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B-BE7F6E345866%7D
http://secunia.com/advisories/44097 Vendor Advisory
http://securityreason.com/securityalert/8403
http://securitytracker.com/id?1025353
http://www.securityfocus.com/archive/1/517489/100/0/threaded
http://www.securityfocus.com/archive/1/517490/100/0/threaded
http://www.securityfocus.com/archive/1/517491/100/0/threaded
http://www.securityfocus.com/archive/1/517493/100/0/threaded
http://www.securityfocus.com/archive/1/517494/100/0/threaded
http://www.securityfocus.com/archive/1/517496/100/0/threaded
http://www.securityfocus.com/archive/1/517497/100/0/threaded
http://www.securityfocus.com/archive/1/517498/100/0/threaded
http://www.securityfocus.com/bid/47355
http://www.vupen.com/english/advisories/2011/0977 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-11-128/
http://www.zerodayinitiative.com/advisories/ZDI-11-129/
http://www.zerodayinitiative.com/advisories/ZDI-11-130/
http://www.zerodayinitiative.com/advisories/ZDI-11-131/
http://www.zerodayinitiative.com/advisories/ZDI-11-132/
http://www.zerodayinitiative.com/advisories/ZDI-11-133/
http://www.zerodayinitiative.com/advisories/ZDI-11-134/
https://exchange.xforce.ibmcloud.com/vulnerabilities/66725
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B-BE7F6E345866%7D
Configurations

Configuration 1 (hide)

cpe:2.3:a:broadcom:total_defense:r12:*:*:*:*:*:*:*

History

21 Nov 2024, 01:26

Type Values Removed Values Added
References () http://secunia.com/advisories/44097 - Vendor Advisory () http://secunia.com/advisories/44097 - Vendor Advisory
References () http://securityreason.com/securityalert/8403 - () http://securityreason.com/securityalert/8403 -
References () http://securitytracker.com/id?1025353 - () http://securitytracker.com/id?1025353 -
References () http://www.securityfocus.com/archive/1/517489/100/0/threaded - () http://www.securityfocus.com/archive/1/517489/100/0/threaded -
References () http://www.securityfocus.com/archive/1/517490/100/0/threaded - () http://www.securityfocus.com/archive/1/517490/100/0/threaded -
References () http://www.securityfocus.com/archive/1/517491/100/0/threaded - () http://www.securityfocus.com/archive/1/517491/100/0/threaded -
References () http://www.securityfocus.com/archive/1/517493/100/0/threaded - () http://www.securityfocus.com/archive/1/517493/100/0/threaded -
References () http://www.securityfocus.com/archive/1/517494/100/0/threaded - () http://www.securityfocus.com/archive/1/517494/100/0/threaded -
References () http://www.securityfocus.com/archive/1/517496/100/0/threaded - () http://www.securityfocus.com/archive/1/517496/100/0/threaded -
References () http://www.securityfocus.com/archive/1/517497/100/0/threaded - () http://www.securityfocus.com/archive/1/517497/100/0/threaded -
References () http://www.securityfocus.com/archive/1/517498/100/0/threaded - () http://www.securityfocus.com/archive/1/517498/100/0/threaded -
References () http://www.securityfocus.com/bid/47355 - () http://www.securityfocus.com/bid/47355 -
References () http://www.vupen.com/english/advisories/2011/0977 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0977 - Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-11-128/ - () http://www.zerodayinitiative.com/advisories/ZDI-11-128/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-11-129/ - () http://www.zerodayinitiative.com/advisories/ZDI-11-129/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-11-130/ - () http://www.zerodayinitiative.com/advisories/ZDI-11-130/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-11-131/ - () http://www.zerodayinitiative.com/advisories/ZDI-11-131/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-11-132/ - () http://www.zerodayinitiative.com/advisories/ZDI-11-132/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-11-133/ - () http://www.zerodayinitiative.com/advisories/ZDI-11-133/ -
References () http://www.zerodayinitiative.com/advisories/ZDI-11-134/ - () http://www.zerodayinitiative.com/advisories/ZDI-11-134/ -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/66725 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/66725 -
References () https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B-BE7F6E345866%7D - () https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B-BE7F6E345866%7D -

07 Nov 2023, 02:07

Type Values Removed Values Added
References
  • {'url': 'https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={CD065CEC-AFE2-4D9D-8E0B-BE7F6E345866}', 'name': 'https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={CD065CEC-AFE2-4D9D-8E0B-BE7F6E345866}', 'tags': ['Broken Link'], 'refsource': 'CONFIRM'}
  • () https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7BCD065CEC-AFE2-4D9D-8E0B-BE7F6E345866%7D -

Information

Published : 2011-04-18 15:00

Updated : 2024-11-21 01:26


NVD link : CVE-2011-1653

Mitre link : CVE-2011-1653

CVE.ORG link : CVE-2011-1653


JSON object : View

Products Affected

broadcom

  • total_defense
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')