SQL injection vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to obtain product information via a crafted HTTP request parameter.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/94823 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037433 | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10181 | Vendor Advisory |
https://www.exploit-db.com/exploits/40911/ | |
http://www.securityfocus.com/bid/94823 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037433 | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10181 | Vendor Advisory |
https://www.exploit-db.com/exploits/40911/ |
Configurations
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/94823 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037433 - | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10181 - Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/40911/ - |
Information
Published : 2017-03-14 22:59
Updated : 2024-11-21 02:58
NVD link : CVE-2016-8025
Mitre link : CVE-2016-8025
CVE.ORG link : CVE-2016-8025
JSON object : View
Products Affected
mcafee
- virusscan_enterprise
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')