04 Nov 2016
CVE-2016-9184 Vulnerability
In /framework/modules/core/controllers/expHTMLEditorController.php of Exponent CMS 2.4.0, untrusted input is used to construct a table name, and in the selectObject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for SQL Injection. Impact is Information Disclosure. (CVSS:5.0) (Last Update:2016-11-04)
Vulnerability Details : In /framework/modules/core/controllers/expHTMLEditorController.php of Exponent CMS 2.4.0, untrusted input is used to construct a table name, and in the selectObject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for SQL Injection. Impact is Information Disclosure. Publish Date : 2016-11-04 Last Update Date : 2016-11-04 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2016-9184
- Number Of Affected Versions By Product
- References For CVE-2016-9184
| |||||||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2016-9184There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |