Description
Multiple SQL injection vulnerabilities in DUware DUportal Pro 3.4 allow remote attackers to execute arbitrary SQL commands via the (1) nChannel parameter to default.asp, cat.asp, or detail.asp, (2) the iChannel parameter to search.asp, default.asp, result.asp, cat.asp, or detail.asp (3) the iCat parameter to cat.asp or detail.asp, (4) the iData parameter to detail.asp or result.asp, the (5) POL_ID, (6) POL_PARENT, (7) POL_CATEGORY, (8) CHA_NAME, or (9) CHA_ID parameters to inc_vote.asp, or the (10) tfm_order or (11) tfm_orderby parameters to toppages.asp, a different set of vulnerabilities than CVE-2005-1236.
Exploits (6)
References (8)
Core 8
Core References
Exploit x_refsource_misc
http://www.securiteam.com/windowsntfocus/5TP0O0AFFQ.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13285
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/453316/100/0/threaded
Various Sources x_refsource_misc
http://www.digitalparadox.org/advisories/duppro.txt
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111401172901705&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/20197
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/15031
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/30671
Scores
EPSS
0.0246
EPSS Percentile
85.3%
Details
Status
published
Products (3)
duware/duportal
3.4
duware/duportal
pro_3.4
duware/duportal
sql_3.4
Published
May 02, 2005
Tracked Since
Feb 18, 2026