Last Modified: Sept. 5, 2008
SQL injection vulnerability in Mailidx before 20020105 allows remote attackers to execute arbitrary SQL commands via the search web page.
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial
Base Score: 7.5
Exploitability Score: 10.0
Impact Score: 6.4
CVSS V2: AV:N/AC:L/Au:N/C:P/I:P/A:P
NVD-CWE-Other
['alert tcp $EXTERNAL_NET any -> $HOME_NET 21 ( msg:"PROTOCOL-FTP format string attempt"; flow:to_server,established; content:"%",fast_pattern,nocase; pcre:"/\\s+.*?%.*?%/ims"; metadata:ruleset community; service:ftp; reference:bugtraq,15352; reference:bugtraq,30993; reference:bugtraq,9800; reference:cve,2002-2074; reference:cve,2007-1195; reference:cve,2009-4769; classtype:string-detect; sid:2417; rev:17; )\n', '# alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"PROTOCOL-FTP format string attempt"; flow:to_server,established; content:"%"; fast_pattern:only; pcre:"/\\s+.*?%.*?%/smi"; metadata:ruleset community, service ftp; reference:bugtraq,15352; reference:bugtraq,30993; reference:bugtraq,9800; reference:cve,2002-2074; reference:cve,2007-1195; reference:cve,2009-4769; classtype:string-detect; sid:2417; rev:17;)\n']
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:erwin_lansing:mailidx:20010925:*:*:*:*:*:*:* Part: a Vendor: erwin_lansing | Alle Schwachstellen für erwin_lansing |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:erwin_lansing:mailidx:20010925:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <prop key="target" value="host"/> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="output"/> <prop key="program_influence" value="existence"/> </set> <prop key="data" value="any"/> <set operator="or"> <prop key="data_influence" value="read"/> <prop key="data_influence" value="write"/> <prop key="data_influence" value="delete"/> </set> <set operator="or"> <prop key="range" value="remote"/> <prop key="range" value="local"/> </set> </set>