Multiple SQL injection vulnerabilities in Support Incident Tracker (aka SiT!) before 3.65 allow remote attackers to execute arbitrary SQL commands via the (1) start parameter to portal/kb.php; (2) contractid parameter to contract_add_service.php; (3) id parameter to edit_escalation_path.php; (4) unlock, (5) lock, or (6) selected parameter to holding_queue.php; inc parameter in a report action to (7) report_customers.php or (8) report_incidents_by_site.php; (9) start parameter to search.php; or (10) sites parameter to transactions.php.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:15:12

Updated: 2022-10-03T16:15:12

Reserved: 2022-10-03T00:00:00


Link: CVE-2011-5072

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2012-01-29T11:55:02.187

Modified: 2012-02-02T05:00:00.000


Link: CVE-2011-5072

JSON object: View

cve-icon Redhat Information

No data.

CWE