CVE-2005-2468
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
31/12/2005
Last modified:
03/04/2025
Description
Multiple SQL injection vulnerabilities in MySQL Eventum 1.5.5 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) isCorrectPassword or (2) userExist function in class.auth.php, getCustomFieldReport function in (4) custom_fields.php, (5) custom_fields_graph.php, or (6) class.report.php, or the insert function in (7) releases.php or (8) class.release.php.
Impact
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mysql:eventum:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:eventum:1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:eventum:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:eventum:1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:eventum:1.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:eventum:1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:eventum:1.5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mysql:eventum:1.5.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.mysql.com/eventum-users/2072
- http://marc.info/?l=bugtraq&m=112292193807958&w=2
- http://secunia.com/advisories/16304
- http://securitytracker.com/id?1014603=
- http://www.gulftech.org/?node=research&article_id=00093-07312005
- http://www.osvdb.org/18403
- http://www.osvdb.org/18404
- http://www.osvdb.org/18405
- http://www.osvdb.org/18406
- http://www.securityfocus.com/bid/14437
- http://www.vupen.com/english/advisories/2005/1287
- http://lists.mysql.com/eventum-users/2072
- http://marc.info/?l=bugtraq&m=112292193807958&w=2
- http://secunia.com/advisories/16304
- http://securitytracker.com/id?1014603=
- http://www.gulftech.org/?node=research&article_id=00093-07312005
- http://www.osvdb.org/18403
- http://www.osvdb.org/18404
- http://www.osvdb.org/18405
- http://www.osvdb.org/18406
- http://www.securityfocus.com/bid/14437
- http://www.vupen.com/english/advisories/2005/1287



