[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108566

 
 

909

 
 

85401

 
 

134

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2007-3677Date: (C)2007-07-11   (M)2018-02-19


Multiple SQL injection vulnerabilities in Maxsi eVisit Analyst allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) idsp1.pl, (2) ip.pl, and (3) einsite_director.pl. NOTE: this issue can be leveraged for path disclosure from resulting error messages.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 7.5
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  
Reference:
http://www.attrition.org/pipermail/vim/2007-July/001716.html
BID-24849
SECUNIA-26110
OSVDB-36112
OSVDB-36113
OSVDB-36114
evisit-analyst-id-path-disclosure(35482)
evisit-analyst-id-sql-injection(35481)
http://www.nth-dimension.org.uk/pub/Portcullis-06-057.txt
http://www.portcullis.co.uk/uplds/advisories/easql%2006-057.txt

CWE    1
CWE-89

© SecPod Technologies