9.4 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.01 Low
EPSS
Percentile
83.2%
Multiple SQL injection vulnerabilities in Milkeyway Captive Portal 0.1 and 0.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) username, (2) password, (3) team, (4) level, (5) status, (6) teamname, and (7) teamlead parameters in (a) auth.php; the (8) username, (9) action, and (10) filter parameters in (b) authuser.php; the (11) username parameter in © utils.php; the (12) id and (13) date parameters in (d) traffic.php; the (14) username parameter in (e) userstatistics.php; and the (15) USERNAME and (16) PASSWORD parameters in a cookie to (f) chgpwd.php.
secunia.com/advisories/19258
securitytracker.com/id?1015778
www.osvdb.org/23925
www.osvdb.org/23927
www.osvdb.org/23928
www.osvdb.org/23929
www.osvdb.org/23931
www.securityfocus.com/archive/1/427890/100/0/threaded
www.securityfocus.com/bid/17127
www.ush.it/team/ascii/hack-milkeway/advisory.txt
www.ush.it/team/ascii/hack-milkeway/milkeyway.txt
www.vupen.com/english/advisories/2006/0968
exchange.xforce.ibmcloud.com/vulnerabilities/25281
exchange.xforce.ibmcloud.com/vulnerabilities/25287