First published: Tue Aug 29 2006(Updated: )
Multiple SQL injection vulnerabilities in Cybozu Garoon 2.1.0 for Windows allow remote authenticated users to execute arbitrary SQL commands via the (1) tid parameter in the (a) todo/view (aka TODO List View), (b) todo/modify (aka TODO List Modify), or (c) todo/delete functionality; the (2) pid parameter in the (d) workflow/view or (e) workflow/print functionality; the (3) uid parameter in the (f) schedule/user_view, (g) phonemessage/add, (h) phonemessage/history, or (i) schedule/view functionality; the (4) cid parameter in (j) todo/index; the (5) iid parameter in the (k) memo/view or (l) memo/print functionality; or the (6) event parameter in the (m) schedule/view functionality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Garoon | =2.1.0_for_windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.