Total vulnerabilities in the database
Interchange before 5.0.1 allows remote attackers to "expose the content of arbitrary variables" and read or modify sensitive SQL information via an HTTP request ending with the "SQLUSER" string.
Software | From | Fixed in |
---|---|---|
interchange_development_group / interchange | 4.8.4 | 4.8.4.x |
interchange_development_group / interchange | 4.8.1 | 4.8.1.x |
interchange_development_group / interchange | 4.8.3 | 4.8.3.x |
interchange_development_group / interchange | 5.0 | 5.0.x |
interchange_development_group / interchange | 4.8.9 | 4.8.9.x |
interchange_development_group / interchange | 4.8.6 | 4.8.6.x |
interchange_development_group / interchange | 4.8.7 | 4.8.7.x |
interchange_development_group / interchange | 4.8.5 | 4.8.5.x |
interchange_development_group / interchange | 4.8.8 | 4.8.8.x |
interchange_development_group / interchange | 4.8.2 | 4.8.2.x |