First published: Fri Sep 28 2012(Updated: )
Multiple SQL injection vulnerabilities in the get_sample_filters_by_signature function in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to execute arbitrary SQL commands via the (1) agent or (2) object id.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trevor Mckay Cumin | <=0.1.5192-4 | |
Trevor Mckay Cumin | =0.1.3160-1 | |
Trevor Mckay Cumin | =0.1.4369-1 | |
Trevor Mckay Cumin | =0.1.4410-2 | |
Trevor Mckay Cumin | =0.1.4494-1 | |
Trevor Mckay Cumin | =0.1.4794-1 | |
Trevor Mckay Cumin | =0.1.4916-1 | |
Trevor Mckay Cumin | =0.1.5033-1 | |
Trevor Mckay Cumin | =0.1.5037-1 | |
Trevor Mckay Cumin | =0.1.5054-1 | |
Trevor Mckay Cumin | =0.1.5068-1 | |
Trevor Mckay Cumin | =0.1.5092-1 | |
Trevor Mckay Cumin | =0.1.5098-2 | |
Trevor Mckay Cumin | =0.1.5105-1 | |
Trevor Mckay Cumin | =0.1.5137-1 | |
Trevor Mckay Cumin | =0.1.5137-2 | |
Trevor Mckay Cumin | =0.1.5137-3 | |
Trevor Mckay Cumin | =0.1.5137-4 | |
Trevor Mckay Cumin | =0.1.5137-5 | |
Trevor Mckay Cumin | =0.1.5192-1 | |
Redhat Enterprise Mrg | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.