CVE-2011-3195

shared/inc/sql/lists.php in Domain Technologie Control (DTC) before 0.34.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in mailing list tunable options.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gplhost:domain_technologie_control:*:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.24.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.25.1:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.25.2:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.25.3:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.26.7:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.26.8:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.26.9:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.27.3:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.2:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.3:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.4:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.9:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.10:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.1:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.8:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.10:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.14:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.15:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.16:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.17:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.8:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.10:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.18:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.20:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.1:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.2:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.3:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.4:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.5:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.7:*:*:*:*:*:*:*

History

21 Nov 2024, 01:29

Type Values Removed Values Added
References () http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=blob%3Bf=debian/changelog%3Bhb=3eb6ef5cea6c571aae5e49e1930de778eca280c3 - () http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=blob%3Bf=debian/changelog%3Bhb=3eb6ef5cea6c571aae5e49e1930de778eca280c3 -
References () http://www.debian.org/security/2011/dsa-2365 - () http://www.debian.org/security/2011/dsa-2365 -
References () http://www.openwall.com/lists/oss-security/2011/08/13/1 - () http://www.openwall.com/lists/oss-security/2011/08/13/1 -
References () http://www.openwall.com/lists/oss-security/2011/08/24/10 - () http://www.openwall.com/lists/oss-security/2011/08/24/10 -
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637477 - () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637477 -

07 Nov 2023, 02:08

Type Values Removed Values Added
References
  • {'url': 'http://git.gplhost.com/gitweb/?p=dtc.git;a=blob;f=debian/changelog;hb=3eb6ef5cea6c571aae5e49e1930de778eca280c3', 'name': 'http://git.gplhost.com/gitweb/?p=dtc.git;a=blob;f=debian/changelog;hb=3eb6ef5cea6c571aae5e49e1930de778eca280c3', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=blob%3Bf=debian/changelog%3Bhb=3eb6ef5cea6c571aae5e49e1930de778eca280c3 -

Information

Published : 2014-03-21 04:38

Updated : 2024-11-21 01:29


NVD link : CVE-2011-3195

Mitre link : CVE-2011-3195

CVE.ORG link : CVE-2011-3195


JSON object : View

Products Affected

gplhost

  • domain_technologie_control
CWE
CWE-20

Improper Input Validation