|
Vulnerability Assessment & Network Security Forums |
||||||||||||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PlaySMS Cookie SQL Injection Vulnerability Assessment Details
|
PlaySMS Cookie SQL Injection |
||
Tests for the PlaySMS SQL Injection Detailed Explanation for this Vulnerability Assessment PlaySMS is a full-featured SMS gateway application that features sending of single or broadcast SMSes, the ability to receive and forward SMSes, an SMS board, an SMS polling system, SMS customs for handling incoming SMSes and forwarding them to custom applications, and SMS commands for saving/retrieving information to/from a server and executing server-side shell scripts. An SQL Injection vulnerability in the product permits remote attackers to inject arbitrary SQL statements via the cookie mechanism used by the product. See also : http://sourceforge.net/project/shownotes.php?release_id=254915 Solution : Upgrade to version 0.7.1 or later. Network Security Threat Level: High Networks Security ID: 10751, 10752, 10970 Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Noam Rathaus |
||
Cables, Connectors |
C-Lab Notator SL 3.1 dongle Atari st $75.0 |
![]() | ATARI 9FT CABLE $6.5 |
![]() | VTG Atari 400/800/XL/XE Cartridge Pitfall II:Lost Caverns Activision CA-011-04 $22.99 |
![]() | 1983 Atari Basic Manual - Richard Haskell $9.95 |
![]() | ![]() |
|
||
No Discussions have been posted on this vulnerability. |