ID CVE-2006-1237
Summary Multiple SQL injection vulnerabilities in DSNewsletter 1.0, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the email parameter to (1) include/sub.php, (2) include/confirm.php, or (3) include/unconfirm.php. Successful exploitation requires that the "magic_quotes_gpc" parameter is disabled.
References
Vulnerable Configurations
  • cpe:2.3:a:dsportal:dsnewsletter:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:dsportal:dsnewsletter:1.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-10-2018 - 16:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 17111
bugtraq 20060324 [eVuln] DSNewsletter SQL Injection Vulnerability
misc http://evuln.com/vulns/97/summary.html
osvdb
  • 23883
  • 23884
  • 23885
sectrack 1015757
secunia 19207
sreason 623
vupen ADV-2006-0931
xf dsnewsletter-email-sql-injection(25188)
Last major update 18-10-2018 - 16:31
Published 15-03-2006 - 16:06
Last modified 18-10-2018 - 16:31
Back to Top