The valueAsString parameter in JSON payload of ucLogin_txtLoginId_ClientStat POST parameter in Sungard eTRAKiT3 v3.2.1.17 is not validated, allowing SQL injection
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | Sungard eTRAKiT3 3.2.1.17 - SQL Injection | 2 Jun 201700:00 | – | exploitpack |
![]() | Sungard eTRAKiT3 <= 3.2.1.17 - SQL Injection | 2 Jun 201700:00 | – | exploitdb |
![]() | CVE-2016-6566 The Sungard eTRAKiT3 software version 3.2.1.17 may be vulnerable to SQL injection which may allow a remote unauthenticated attacker to run a subset of SQL commands against the back-end database | 13 Jul 201820:00 | – | cvelist |
![]() | Design/Logic Flaw | 13 Jul 201820:29 | – | prion |
![]() | CVE-2016-6566 | 13 Jul 201820:29 | – | cve |
![]() | Sungard eTRAKiT3 may be vulnerable to SQL injection | 6 Dec 201600:00 | – | cert |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/94696 |
kb | www.kb.cert.org/vuls/id/846103 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo