SQL injection vulnerability in includes/nsbypass.php in NukeSentinel 2.5.05, 2.5.11, and other versions before 2.5.12 allows remote attackers to execute arbitrary SQL commands via an admin cookie.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.waraxe.us/advisory-53.html | x_refsource_MISC |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/32582 | vdb-entry x_refsource_XF |
| http://www.securityfocus.com/bid/22629 | vdb-entry x_refsource_BID |
| http://www.nukescripts.net/index.php?op=NEArticle&sid=4076 | x_refsource_CONFIRM |
| http://www.attrition.org/pipermail/vim/2007-September/001806.html | mailing-list x_refsource_VIM |
| https://www.exploit-db.com/exploits/3337 | exploit x_refsource_EXPLOIT-DB |
| http://securityreason.com/securityalert/2344 | third-party-advisory x_refsource_SREASON |
| http://www.securityfocus.com/archive/1/480994/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://www.securityfocus.com/archive/1/460628/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://www.securityfocus.com/archive/1/480575/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://www.securityfocus.com/bid/25805 | vdb-entry x_refsource_BID |
| http://secunia.com/advisories/26954 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|