The login form of baltic-it TOPqw Webportal v1.35.283.2 (fixed in version 1.35.283.4) at /Apps/TOPqw/Login.aspx is vulnerable to SQL injection. The vulnerability exists in the POST parameter txtUsername, which allows for manipulation of SQL queries.
References
Link | Resource |
---|---|
https://cyber.wtf/2024/11/11/topqw-webportal-cves/ |
Configurations
No configuration.
History
21 Nov 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
15 Nov 2024, 14:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Nov 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-13 21:15
Updated : 2024-11-21 22:15
NVD link : CVE-2024-45876
Mitre link : CVE-2024-45876
CVE.ORG link : CVE-2024-45876
JSON object : View
Products Affected
No product.
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')