Description
SQL injection vulnerability in status/service/acknowledge in Opsview before 4.4.1 allows remote attackers to execute arbitrary SQL commands via the service_selection parameter.
Exploits (1)
References (7)
Core 7
Core References
Exploit x_refsource_misc
http://osvdb.org/ref/99/opsview-sqli.txt
Exploit x_refsource_misc
http://packetstormsecurity.com/files/123821/Ops-View-Pre-4.4.1-Blind-SQL-Injection.html
Various Sources x_refsource_misc
http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/29326
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/99038
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/63387
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2013-10/0149.html
Scores
EPSS
0.0194
EPSS Percentile
83.6%
Details
CWE
CWE-89
Status
published
Products (19)
opsview/opsview
2.7
opsview/opsview
2.8
opsview/opsview
2.10
opsview/opsview
2.12
opsview/opsview
2.14
opsview/opsview
3.0
opsview/opsview
3.1
opsview/opsview
3.2
opsview/opsview
3.4
opsview/opsview
3.6
... and 9 more
Published
Nov 05, 2013
Tracked Since
Feb 18, 2026