SQL injection vulnerability in bt-trackback.php in Bluetrait before 1.2.0, when trackback is enabled, allows remote attackers to execute arbitrary SQL commands via unspecified parameters. NOTE: some of these details are obtained from third party information.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bluetrait | Bluetrait | * | 1.1.1 (including) |
Bluetrait | Bluetrait | 0.3.2 (including) | 0.3.2 (including) |
Bluetrait | Bluetrait | 0.3.3 (including) | 0.3.3 (including) |
Bluetrait | Bluetrait | 0.3.5 (including) | 0.3.5 (including) |
Bluetrait | Bluetrait | 0.3.6 (including) | 0.3.6 (including) |
Bluetrait | Bluetrait | 0.3.7 (including) | 0.3.7 (including) |
Bluetrait | Bluetrait | 0.3.8 (including) | 0.3.8 (including) |
Bluetrait | Bluetrait | 0.3.9 (including) | 0.3.9 (including) |
Bluetrait | Bluetrait | 0.3.10 (including) | 0.3.10 (including) |
Bluetrait | Bluetrait | 0.4 (including) | 0.4 (including) |
Bluetrait | Bluetrait | 0.4.1 (including) | 0.4.1 (including) |
Bluetrait | Bluetrait | 0.4.2 (including) | 0.4.2 (including) |
Bluetrait | Bluetrait | 0.4.3 (including) | 0.4.3 (including) |
Bluetrait | Bluetrait | 0.4.4 (including) | 0.4.4 (including) |
Bluetrait | Bluetrait | 0.4.5 (including) | 0.4.5 (including) |
Bluetrait | Bluetrait | 0.4.6 (including) | 0.4.6 (including) |
Bluetrait | Bluetrait | 0.4.7 (including) | 0.4.7 (including) |
Bluetrait | Bluetrait | 0.4.8_beta1 (including) | 0.4.8_beta1 (including) |
Bluetrait | Bluetrait | 0.4.9 (including) | 0.4.9 (including) |
Bluetrait | Bluetrait | 0.4.10 (including) | 0.4.10 (including) |
Bluetrait | Bluetrait | 0.5.1 (including) | 0.5.1 (including) |
Bluetrait | Bluetrait | 0.5.2 (including) | 0.5.2 (including) |
Bluetrait | Bluetrait | 0.5.3 (including) | 0.5.3 (including) |
Bluetrait | Bluetrait | 0.5_beta2 (including) | 0.5_beta2 (including) |
Bluetrait | Bluetrait | 1.0.0 (including) | 1.0.0 (including) |
Bluetrait | Bluetrait | 1.1.0 (including) | 1.1.0 (including) |