Vulnerability Description
SQL injection vulnerability in login.php in dwayner79 and Dominic Gamble Timesheet (aka Timesheet.php) 1.2.1 allows remote attackers to execute arbitrary SQL commands via the username parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dominic Gamble | Timesheet.Php | 1.2.1 |
References
- http://secaware.blogspot.com/2006/09/timesheet-121-blind-sql-injection.html
- http://secunia.com/advisories/21831
- http://securityreason.com/securityalert/1542
- http://www.securityfocus.com/archive/1/445603/100/0/threaded
- http://www.securityfocus.com/bid/19856
- http://www.vupen.com/english/advisories/2006/3547
- http://secaware.blogspot.com/2006/09/timesheet-121-blind-sql-injection.html
- http://secunia.com/advisories/21831
- http://securityreason.com/securityalert/1542
- http://www.securityfocus.com/archive/1/445603/100/0/threaded
- http://www.securityfocus.com/bid/19856
- http://www.vupen.com/english/advisories/2006/3547
FAQ
What is CVE-2006-4705?
CVE-2006-4705 is a vulnerability with a CVSS score of 5.0 (MEDIUM). SQL injection vulnerability in login.php in dwayner79 and Dominic Gamble Timesheet (aka Timesheet.php) 1.2.1 allows remote attackers to execute arbitrary SQL commands via the username parameter.
How severe is CVE-2006-4705?
CVE-2006-4705 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4705?
Check the references section above for vendor advisories and patch information. Affected products include: Dominic Gamble Timesheet.Php.