Published on May 23rd, 2019 📆 | 6067 Views ⚑
0Commsy up to 8.6.5 cid sql injection
https://www.ispeech.org/text.to.speech
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
6.0 | $0-$5k |
A vulnerability, which was classified as critical, was found in Commsy up to 8.6.5. This affects a function. The manipulation of the argument cid
as part of a Parameter leads to a sql injection vulnerability. CWE is classifying the issue as CWE-89. This is going to have an impact on confidentiality, integrity, and availability. An attacker might be able inject and/or alter existing SQL statements which would influence the database exchange.
The weakness was shared 05/22/2019. This vulnerability is uniquely identified as CVE-2019-11880 since 05/10/2019. It is possible to initiate the attack remotely. Technical details are known, but no exploit is available.
Upgrading to version 9.2 eliminates this vulnerability.
Name
VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.0
VulDB Base Score: ≈6.3
VulDB Temp Score: ≈6.0
VulDB Vector: ?
VulDB Reliability: ?
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Sql injection (CWE-89)
Local: No
Remote: Yes
Availability: ?
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?
Upgrade: Commsy 9.2
05/10/2019 CVE assigned
05/22/2019 Advisory disclosed
05/22/2019 VulDB entry created
05/22/2019 VulDB last updateCVE: CVE-2019-11880 (?)Created: 05/22/2019 09:47 PM
Complete: ?
Use the official API to access entries easily!
https://vuldb.com/?id.135309
Gloss