First published: Wed Jun 22 2005(Updated: )
SQL injection vulnerability in the logon screen of the web front end (NmConsole/Login.asp) for IpSwitch WhatsUp Professional 2005 SP1 allows remote attackers to execute arbitrary SQL commands via the (1) User Name field (sUserName parameter) or (2) Password (sPassword parameter).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WhatsUp Small Business | =professional_2005_sp1 | |
Ipswitch WhatsUp Professional | =professional_2005_sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1250 is classified as a high severity SQL injection vulnerability.
To fix CVE-2005-1250, you should upgrade to a newer version of IpSwitch WhatsUp that has addressed this vulnerability.
The potential impacts of CVE-2005-1250 include unauthorized access and manipulation of the database, leading to data exposure or corruption.
CVE-2005-1250 affects IpSwitch WhatsUp Professional 2005 SP1.
Attackers can exploit CVE-2005-1250 by injecting malicious SQL commands through the User Name or Password fields in the logon screen.