7.5
CVSSv2

CVE-2005-4427

Published: 20/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in Cerberus Helpdesk allow remote malicious users to execute arbitrary SQL commands via the (1) file_id parameter to attachment_send.php, (2) the $addy variable in email_parser.php, (3) $address variable in email_parser.php, (4) $a_address variable in structs.php, (5) kbid parameter to cer_KnowledgebaseHandler.class.php, (6) queues[] parameter to addresses_export.php, (7) $thread variable to display.php, (8) ticket parameter to display_ticket_thread.php.

Vulnerable Product Search on Vulmon Subscribe to Product

cerberus cerberus helpdesk 2.649

Exploits

source: wwwsecurityfocuscom/bid/16062/info Cerberus Helpdesk is prone to multiple cross-site scripting and SQL injection vulnerabilities These issues are the result of inadequate validation of user-supplied input that will be included in site output or in SQL queries The cross-site scripting vulnerability may permit a remote attacker t ...
source: wwwsecurityfocuscom/bid/16062/info Cerberus Helpdesk is prone to multiple cross-site scripting and SQL injection vulnerabilities These issues are the result of inadequate validation of user-supplied input that will be included in site output or in SQL queries The cross-site scripting vulnerability may permit a remote attacker ...
source: wwwsecurityfocuscom/bid/16062/info Cerberus Helpdesk is prone to multiple cross-site scripting and SQL injection vulnerabilities These issues are the result of inadequate validation of user-supplied input that will be included in site output or in SQL queries The cross-site scripting vulnerability may permit a remote attack ...