Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2014-125062: FIX: SQL Injection · ananich/bitstorm@ea8da92

A vulnerability classified as critical was found in ananich bitstorm. Affected by this vulnerability is an unknown functionality of the file announce.php. The manipulation of the argument event leads to sql injection. The name of the patch is ea8da92f94cdb78ee7831e1f7af6258473ab396a. It is recommended to apply a patch to fix this issue. The identifier VDB-217621 was assigned to this vulnerability.

CVE
#sql#vulnerability#php

@@ -108,12 +108,12 @@

$state = 'state’;

$attempt = 'attempt’;

if (isset($_GET[‘event’])){

$state = “’” . $_GET[‘event’] . "’";

$state = “’” . mysql_real_escape_string($_GET[‘event’]) . "’";

$attempt = 'LAST_INSERT_ID(peer_torrent.id)';

}

mysql_query('INSERT INTO peer_torrent (peer_id, torrent_id, uploaded, downloaded, `left`, state, attempt, `last_updated`) '

. 'SELECT ' . $pk_peer . ', `torrent`.`id`, ' . intval($_GET[‘uploaded’]) . ', ' . intval($_GET[‘downloaded’]) . ', ' . intval($_GET[‘left’]) . ', ' . $state . ', ' . 0 . ', UTC_TIMESTAMP() '

mysql_query('INSERT INTO peer_torrent (peer_id, torrent_id, uploaded, downloaded, `left`, attempt, `last_updated`) '

. 'SELECT ' . $pk_peer . ', `torrent`.`id`, ' . intval($_GET[‘uploaded’]) . ', ' . intval($_GET[‘downloaded’]) . ', ' . intval($_GET[‘left’]) . ', ' . 0 . ', UTC_TIMESTAMP() '

. 'FROM `torrent` '

. “WHERE `torrent`.`hash` = '” . mysql_real_escape_string(bin2hex($_GET[‘info_hash’])) . "’ "

. 'ON DUPLICATE KEY UPDATE `uploaded` = VALUES(`uploaded`), `downloaded` = VALUES(`downloaded`), `left` = VALUES(`left`), '

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907