Vulnerability Description
SQL injection vulnerability in the login form in the web interface in Mercator SENTINEL 2.0 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mercator | Sentinel | 2.0 |
Related Weaknesses (CWE)
References
- http://cert.netpeas.org/2011/06/cert-nps2011005-vulnerabilite-potentielle-dans-l
- http://cert.netpeas.org/2011/06/cert-nps2011005-vulnerabilite-potentielle-dans-l
- http://secunia.com/advisories/46014Vendor Advisory
- http://www.kb.cert.org/vuls/id/122142US Government Resource
- http://www.securityfocus.com/bid/49638
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69847
- http://cert.netpeas.org/2011/06/cert-nps2011005-vulnerabilite-potentielle-dans-l
- http://cert.netpeas.org/2011/06/cert-nps2011005-vulnerabilite-potentielle-dans-l
- http://secunia.com/advisories/46014Vendor Advisory
- http://www.kb.cert.org/vuls/id/122142US Government Resource
- http://www.securityfocus.com/bid/49638
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69847
FAQ
What is CVE-2011-1913?
CVE-2011-1913 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in the login form in the web interface in Mercator SENTINEL 2.0 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
How severe is CVE-2011-1913?
CVE-2011-1913 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1913?
Check the references section above for vendor advisories and patch information. Affected products include: Mercator Sentinel.