CVE-2008-0920

SQL injection vulnerability in port/modifyportform.php in Open Source Security Information Management (OSSIM) 0.9.9 rc5 allows remote authenticated users to execute arbitrary SQL commands via the portname parameter, which is not properly handled by a validation regular expression.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open_source_security_information_management:os-sim:*:rc5:*:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://secunia.com/advisories/29046 - () http://secunia.com/advisories/29046 -
References () http://securityreason.com/securityalert/3689 - () http://securityreason.com/securityalert/3689 -
References () http://www.securityfocus.com/archive/1/488450/100/0/threaded - () http://www.securityfocus.com/archive/1/488450/100/0/threaded -
References () http://www.securityfocus.com/archive/1/488617/100/0/threaded - () http://www.securityfocus.com/archive/1/488617/100/0/threaded -
References () http://www.securityfocus.com/bid/27927 - Exploit () http://www.securityfocus.com/bid/27927 - Exploit
References () https://www.exploit-db.com/exploits/5171 - () https://www.exploit-db.com/exploits/5171 -

Information

Published : 2008-02-22 23:44

Updated : 2024-11-21 00:43


NVD link : CVE-2008-0920

Mitre link : CVE-2008-0920

CVE.ORG link : CVE-2008-0920


JSON object : View

Products Affected

open_source_security_information_management

  • os-sim
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')