Multiple SQL injection vulnerabilities in Crafty Syntax Live Help (CSLH) 2.14.6 and earlier allow remote attackers to execute arbitrary SQL commands via the department parameter to (1) is_xmlhttp.php and (2) is_flush.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31573 - Vendor Advisory | |
References | () http://security.craftysyntax.com/updates/?v=2.14.6 - Patch | |
References | () http://securityreason.com/securityalert/4192 - | |
References | () http://sourceforge.net/project/shownotes.php?release_id=620878 - | |
References | () http://www.gulftech.org/?node=research&article_id=00127-08252008 - Exploit | |
References | () http://www.securityfocus.com/archive/1/495729/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/30825 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44669 - | |
References | () https://www.exploit-db.com/exploits/6307 - |
Information
Published : 2008-08-27 23:41
Updated : 2024-11-21 00:50
NVD link : CVE-2008-3845
Mitre link : CVE-2008-3845
CVE.ORG link : CVE-2008-3845
JSON object : View
Products Affected
craftysyntax
- crafty_syntax_live_help
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')