CVE-2009-3642 – HEAT Call Logging 8.01 - SQL Injection
https://notcve.org/view.php?id=CVE-2009-3642
Multiple SQL injection vulnerabilities in the Call Logging feature in FrontRange HEAT 8.01 allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters. Múltiples vulnerabilidades de inyección SQL en la funcionalidad de Registro de llamadas de FrontRange HEAT v8.01 permite a atacantes remotos ejecutar comandos SQL a través de los parámetros (1) UserName y (2) password. • https://www.exploit-db.com/exploits/9809 http://packetstormsecurity.org/0909-exploits/heat-sql.txt http://secunia.com/advisories/36900 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2006-2511
https://notcve.org/view.php?id=CVE-2006-2511
The ActiveX version of FrontRange iHEAT allows remote authenticated users to run arbitrary programs or access arbitrary files on the host machine by uploading a file with an extension that is not associated with an application, and selecting a file from the "Open With..." dialog. • http://secunia.com/advisories/20165 http://securitytracker.com/id?1016124 http://www.securityfocus.com/archive/1/434400/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/26711 •
CVE-2003-0241
https://notcve.org/view.php?id=CVE-2003-0241
FrontRange GoldMine mail agent 5.70 and 6.00 before 30503 directly sends HTML to the default browser without setting its security zone or otherwise labeling it untrusted, which allows remote attackers to execute arbitrary code via a message that is rendered in IE using a less secure zone. FrontRange GoldMine mail agent 5.70 y 6.00 anteiror a30503 envía directamente HTML al navegador por defecto sin fijar su zona de seguridad o marcarla como insegura, lo que permite que atacantes remotos ejecuten código arbitrario mediante un mensaje que se muestre en Internet Explorer usando una zona menos segura. • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0091.html http://www.secnap.net/security/gm001.html •