Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-3076

Опубликовано: 14 окт. 2010
Источник: debian
EPSS Низкий

Описание

The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
smbindfixed0.4.7-5package

Примечания

  • http://packetstormsecurity.org/1009-exploits/smbind-sql.txt

EPSS

Процентиль: 63%
0.00444
Низкий

Связанные уязвимости

ubuntu
около 15 лет назад

The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.

nvd
около 15 лет назад

The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.

github
больше 3 лет назад

The filter function in php/src/include.php in Simple Management for BIND (aka smbind) before 0.4.8 does not anchor a certain regular expression, which allows remote attackers to conduct SQL injection attacks and execute arbitrary SQL commands via the username parameter to the admin login page.

EPSS

Процентиль: 63%
0.00444
Низкий