First published: Sat Dec 31 2005(Updated: )
Multiple SQL injection vulnerabilities in MySQL Eventum 1.5.5 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) isCorrectPassword or (2) userExist function in class.auth.php, getCustomFieldReport function in (4) custom_fields.php, (5) custom_fields_graph.php, or (6) class.report.php, or the insert function in (7) releases.php or (8) class.release.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MySQL Eventum | =1.4 | |
MySQL Eventum | =1.2.2 | |
MySQL Eventum | =1.1 | |
MySQL Eventum | =1.3.1 | |
MySQL Eventum | =1.5.5 | |
MySQL Eventum | =1.3 | |
MySQL Eventum | =1.2 | |
MySQL Eventum | =1.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2468 has a medium severity rating due to its potential for remote SQL injection vulnerabilities.
To fix CVE-2005-2468, upgrade to a newer version of MySQL Eventum that is not affected by these vulnerabilities.
MySQL Eventum versions 1.5.5 and earlier are affected by CVE-2005-2468, specifically versions 1.1 through 1.5.5.
Exploiting CVE-2005-2468 can allow remote attackers to execute arbitrary SQL commands, leading to potential data compromise.
CVE-2005-2468 is classified as a remote vulnerability, allowing exploitation from outside the affected system.