Multiple SQL injection vulnerabilities in Leadhound Full and LITE 2.1, and probably the Network Version Full Version, allow remote attackers to execute arbitrary SQL commands via the (1) banner parameter in agent_links.pl; the offset parameter in (2) agent_links.pl, (3) agent_transactions.pl, (4) agent_subaffiliates.pl, and (5) agent_summary.pl; the camp_id parameter in (6) agent_transactions_csv.pl, (7) agent_subaffiliates.pl, and (8) agent_camp_det.pl; the (9) login parameter in agent_commission_statement.pl; the logged parameter in (10) agent_commission_statement.pl and (11) agent_camp_det.pl; the (12) agent_id parameter in agent_commission_statement.pl; and the (13) sub parameter in unspecified files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Leadhound_full | Leadhound_network | 2.1 (including) | 2.1 (including) |
Leadhound_full | Leadhound_network | 2.1_network_version (including) | 2.1_network_version (including) |
Leadhound_lite | Leadhound_network | 2.1 (including) | 2.1 (including) |