SQL injection vulnerability in status/service/acknowledge in Opsview before 4.4.1 allows remote attackers to execute arbitrary SQL commands via the service_selection parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2013-10/0149.html - Exploit | |
References | () http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes - | |
References | () http://osvdb.org/99038 - | |
References | () http://osvdb.org/ref/99/opsview-sqli.txt - Exploit | |
References | () http://packetstormsecurity.com/files/123821/Ops-View-Pre-4.4.1-Blind-SQL-Injection.html - Exploit | |
References | () http://www.exploit-db.com/exploits/29326 - | |
References | () http://www.securityfocus.com/bid/63387 - Exploit |
Information
Published : 2013-11-05 20:55
Updated : 2024-11-21 01:57
NVD link : CVE-2013-5694
Mitre link : CVE-2013-5694
CVE.ORG link : CVE-2013-5694
JSON object : View
Products Affected
opsview
- opsview
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')