Multiple SQL injection vulnerabilities in Simple Web Content Management System 1.1 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) item_delete.php, (2) item_status.php, (3) item_detail.php, (4) item_modify.php, or (5) item_position.php in admin/; or (6) status parameter to admin/item_status.php.
References
Configurations
History
21 Nov 2024, 01:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/82412 - | |
References | () http://osvdb.org/82413 - | |
References | () http://osvdb.org/82414 - | |
References | () http://www.exploit-db.com/exploits/18955 - Exploit | |
References | () http://www.securityfocus.com/bid/53749 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75999 - |
Information
Published : 2012-06-21 16:55
Updated : 2025-04-11 00:51
NVD link : CVE-2012-3791
Mitre link : CVE-2012-3791
CVE.ORG link : CVE-2012-3791
JSON object : View
Products Affected
cms-center
- simple_web_content_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')