CVE-2008-3765

SQL injection vulnerability in code.php in Quick Poll Script allows remote attackers to execute arbitrary SQL commands via the id parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:discountedscripts:quick_poll_script:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:50

Type Values Removed Values Added
References () http://packetstormsecurity.org/0808-exploits/quickpoll-sql.txt - () http://packetstormsecurity.org/0808-exploits/quickpoll-sql.txt -
References () http://www.securityfocus.com/bid/30724 - Exploit () http://www.securityfocus.com/bid/30724 - Exploit
References () http://www.vupen.com/english/advisories/2008/3141 - () http://www.vupen.com/english/advisories/2008/3141 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44541 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44541 -
References () https://www.exploit-db.com/exploits/7105 - () https://www.exploit-db.com/exploits/7105 -

Information

Published : 2008-08-21 17:41

Updated : 2024-11-21 00:50


NVD link : CVE-2008-3765

Mitre link : CVE-2008-3765

CVE.ORG link : CVE-2008-3765


JSON object : View

Products Affected

discountedscripts

  • quick_poll_script
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')