Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.14362
Categoría:Web application abuses
Título:PlaySMS Cookie SQL Injection
Resumen:PlaySMS is a full-featured SMS gateway application that features sending of; single or broadcast SMSes, the ability to receive and forward SMSes, an SMS board, an SMS polling system, SMS customs; for handling incoming SMSes and forwarding them to custom applications, and SMS commands for saving/retrieving; information to/from a server and executing server-side shell scripts.
Descripción:Summary:
PlaySMS is a full-featured SMS gateway application that features sending of
single or broadcast SMSes, the ability to receive and forward SMSes, an SMS board, an SMS polling system, SMS customs
for handling incoming SMSes and forwarding them to custom applications, and SMS commands for saving/retrieving
information to/from a server and executing server-side shell scripts.

Vulnerability Impact:
An SQL Injection vulnerability in the product allows remote attackers to
inject arbitrary SQL statements via the cookie mechanism used by the product.

Solution:
Upgrade to version 0.7.1 or later.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2004-2263
BugTraq ID: 10970
http://www.securityfocus.com/bid/10970
http://www.securiteam.com/unixfocus/5UP0F2ADPS.html
http://www.osvdb.org/8984
http://securitytracker.com/id?1010984
XForce ISS Database: playsms-valid-sql-injection(17031)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17031
CopyrightCopyright (C) 2004 Noam Rathaus

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.