7.5
CVSSv2

CVE-2005-1236

Published: 02/05/2005 Updated: 05/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 770
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in DUware DUportal 3.1.2 and 3.1.2 SQL allow remote malicious users to execute arbitrary SQL commands via the (1) iChannel parameter to channel.asp or search.asp, (2) iData parameter to detail.asp or inc_rating.asp, (3) iCat parameter to detail.asp or type.asp, (4) DAT_PARENT parameter to inc_poll_voting.asp, or (5) iRate parameter to inc_rating.asp, a different set of vulnerabilities than CVE-2005-1224.

Vulnerable Product Search on Vulmon Subscribe to Product

duware duportal 3.1.2

duware duportal 3.1.2_sql

Exploits

source: wwwsecurityfocuscom/bid/13288/info DUportal/DUportal SQL are prone to multiple SQL injection vulnerabilities These issues exist because the application fails to properly sanitize user-supplied input before using it in SQL queries Successful exploitation could result in a compromise of the application, disclosure or modifica ...
source: wwwsecurityfocuscom/bid/13288/info DUportal/DUportal SQL are prone to multiple SQL injection vulnerabilities These issues exist because the application fails to properly sanitize user-supplied input before using it in SQL queries Successful exploitation could result in a compromise of the application, disclosure or modifica ...
source: wwwsecurityfocuscom/bid/13288/info DUportal/DUportal SQL are prone to multiple SQL injection vulnerabilities These issues exist because the application fails to properly sanitize user-supplied input before using it in SQL queries Successful exploitation could result in a compromise of the application, disclosure or modificati ...
source: wwwsecurityfocuscom/bid/13288/info DUportal/DUportal SQL are prone to multiple SQL injection vulnerabilities These issues exist because the application fails to properly sanitize user-supplied input before using it in SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification ...