Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Sendcard SQL injection


Vulnerability Assessment Details

Sendcard SQL injection

Vulnerability Assessment Summary
Checks for SQL injection in the id field in sendcard.php

Detailed Explanation for this Vulnerability Assessment

The remote host is running Sendcard, a multi-database e-card program written
in PHP.

The version of Sendcard installed on the remote host is prone to a SQL
injection attack due to its failure to sanitize user-supplied input to
the 'id' field in the 'sendcard.php' script.

Solution : Unknown at this time
Network Security Threat Level: Medium

Networks Security ID: 14351

Vulnerability Assessment Copyright: (C) 2005 Josh Zlatin-Amishav

Cables, Connectors

Intel I7-7800X 3.5GHz Six Core (BX80673I77800X) Processor
$250.0
Intel I7-7800X 3.5GHz Six Core (BX80673I77800X) Processor pictureGENUINE LAPTOP MOTHERBOARD HP PAVILION DV7T-4100 605322-001 DA0LX6MB6H1 w/CPU
$59.99
GENUINE LAPTOP  MOTHERBOARD HP PAVILION  DV7T-4100 605322-001 DA0LX6MB6H1 w/CPU pictureSun Microsystems Enterprise 220R 2x 5539 UltraSPARC II CPU 1.4GB Rack Server
$250.99
Sun Microsystems Enterprise 220R 2x 5539 UltraSPARC II CPU 1.4GB Rack Server pictureSun 541-2754-04 Enterprise T5440 1.2GHz 8-Core UltraSPARC T2+ CPU Module
$51.99
Sun 541-2754-04 Enterprise T5440 1.2GHz 8-Core UltraSPARC T2+ CPU Module picture


Discussions

No Discussions have been posted on this vulnerability.