Multiple SQL injection vulnerabilities in Milkeyway Captive Portal 0.1 and 0.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) username, (2) password, (3) team, (4) level, (5) status, (6) teamname, and (7) teamlead parameters in (a) auth.php; the (8) username, (9) action, and (10) filter parameters in (b) authuser.php; the (11) username parameter in (c) utils.php; the (12) id and (13) date parameters in (d) traffic.php; the (14) username parameter in (e) userstatistics.php; and the (15) USERNAME and (16) PASSWORD parameters in a cookie to (f) chgpwd.php.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2006-03-19T23:00:00
Updated: 2018-10-18T14:57:01
Reserved: 2006-03-19T00:00:00
Link: CVE-2006-1289
JSON object: View
NVD Information
Status : Modified
Published: 2006-03-19T23:02:00.000
Modified: 2018-10-18T16:31:55.560
Link: CVE-2006-1289
JSON object: View
Redhat Information
No data.
CWE