Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Sendcard SQL injection


Vulnerability Assessment Details

Sendcard SQL injection

Vulnerability Assessment Summary
Checks for SQL injection in the id field in sendcard.php

Detailed Explanation for this Vulnerability Assessment

The remote host is running Sendcard, a multi-database e-card program written
in PHP.

The version of Sendcard installed on the remote host is prone to a SQL
injection attack due to its failure to sanitize user-supplied input to
the 'id' field in the 'sendcard.php' script.

Solution : Unknown at this time
Network Security Threat Level: Medium

Networks Security ID: 14351

Vulnerability Assessment Copyright: (C) 2005 Josh Zlatin-Amishav

Cables, Connectors

Samsung 250 GB Solid State Drive - PCI Express - Internal - M.2 MZ-V7S250B
$64.81
Samsung 250 GB Solid State Drive - PCI Express - Internal - M.2 MZ-V7S250B pictureLite-On 256GB M.2 NGFF SSD Hard Drive L8H-256V2G-11 Dell P/N: 0MGNHV
$34.95
Lite-On 256GB M.2 NGFF SSD Hard Drive L8H-256V2G-11 Dell P/N: 0MGNHV pictureSamsung 860 EVO SSD 250GB - M.2 SATA Internal Solid State Drive
$50.0
Samsung 860 EVO SSD 250GB - M.2 SATA Internal Solid State Drive pictureCrucial P1 500GB 3D NAND NVMe PCIe M.2 Solid State Drive SSD CT500P1SSD8 - New
$50.0
Crucial P1 500GB 3D NAND NVMe PCIe M.2 Solid State Drive SSD CT500P1SSD8 - New picture


Discussions

No Discussions have been posted on this vulnerability.