7.5
CVSSv2

CVE-2005-4195

Published: 13/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in Scout Portal Toolkit (SPT) 1.3.1 and previous versions allow remote malicious users to execute arbitrary SQL commands via (1) the ParentId parameter in SPT--BrowseResources.php, (2) ResourceId parameter in SPT--FullRecord.php, (3) ResourceOffset parameter in SPT--Home.php, and (4) F_UserName and (5) F_Password in SPT--UserLogin.php. NOTE: it was later reported that vector 1 is also present in 1.4.0.

Vulnerable Product Search on Vulmon Subscribe to Product

internet scout scout portal toolkit 1.3.0_beta

internet scout scout portal toolkit

internet scout project scout portal toolkit 1.4.0

Exploits

source: wwwsecurityfocuscom/bid/15818/info Scout Portal Toolkit is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying ...
#!/usr/bin/perl # Scout Portal Toolkit <= 140 (ParentId) Remote SQL Injection Exploit # Discovered & Coded by JosS # Contact: sys-project[at]hotmailcom # Spanish Hackers Team / Sys - Project / EspSeC # wwwspanish-hackerscom # rgod forever :D print "\t\t########################################################\n\n"; print "\t\t# ...