Vulnerability CVE-2006-1237


Published: 2006-03-15   Modified: 2012-02-12

Description:
Multiple SQL injection vulnerabilities in DSNewsletter 1.0, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the email parameter to (1) include/sub.php, (2) include/confirm.php, or (3) include/unconfirm.php.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
DSNewsletter SQL Injection Vulnerability
alex evuln com
25.03.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Dsportal -> Dsnewsletter 

 References:
http://evuln.com/vulns/97/summary.html
http://securityreason.com/securityalert/623
http://securitytracker.com/id?1015757
http://www.securityfocus.com/archive/1/428664/100/0/threaded
http://www.securityfocus.com/bid/17111
http://www.vupen.com/english/advisories/2006/0931
https://exchange.xforce.ibmcloud.com/vulnerabilities/25188

Copyright 2024, cxsecurity.com

 

Back to Top