Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.103654
Categoría:Web application abuses
Título:DataLife Engine 'catlist' Parameter PHP Code Injection Vulnerability
Resumen:DataLife Engine is prone to a remote PHP code-injection vulnerability.;;An attacker can exploit this issue to inject and execute arbitrary PHP;code in the context of the affected application. This may facilitate a;compromise of the application and the underlying system. Other attacks;are also possible.;;DataLife Engine 9.7 is vulnerable. Other versions may also be affected.
Descripción:Summary:
DataLife Engine is prone to a remote PHP code-injection vulnerability.

An attacker can exploit this issue to inject and execute arbitrary PHP
code in the context of the affected application. This may facilitate a
compromise of the application and the underlying system. Other attacks
are also possible.

DataLife Engine 9.7 is vulnerable. Other versions may also be affected.

Solution:
Vendor updates are available. Please see the references for details.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2013-1412
BugTraq ID: 57603
http://www.securityfocus.com/bid/57603
Bugtraq: 20130128 [KIS-2013-01] DataLife Engine 9.7 (preview.php) PHP Code Injection Vulnerability (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2013-01/0117.html
http://www.exploit-db.com/exploits/24438
http://www.exploit-db.com/exploits/24444
http://karmainsecurity.com/KIS-2013-01
http://osvdb.org/89662
http://secunia.com/advisories/51971
CopyrightCopyright (C) 2013 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.