Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-6132
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-13 Feb, 2009 | 18:30
Updated At-29 Sep, 2017 | 01:32

Eval injection vulnerability in reserve.php in phpScheduleIt 1.2.10 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via the start_date parameter.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

brickhost
brickhost
>>phpscheduleit>>Versions up to 1.2.10(inclusive)
cpe:2.3:a:brickhost:phpscheduleit:*:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.0
cpe:2.3:a:brickhost:phpscheduleit:1.0:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.0.0rc1
cpe:2.3:a:brickhost:phpscheduleit:1.0.0rc1:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.0_rc1
cpe:2.3:a:brickhost:phpscheduleit:1.0_rc1:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.0
cpe:2.3:a:brickhost:phpscheduleit:1.2.0:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.0
cpe:2.3:a:brickhost:phpscheduleit:1.2.0:beta:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.0
cpe:2.3:a:brickhost:phpscheduleit:1.2.0:rc1:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.1
cpe:2.3:a:brickhost:phpscheduleit:1.2.1:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.2
cpe:2.3:a:brickhost:phpscheduleit:1.2.2:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.3
cpe:2.3:a:brickhost:phpscheduleit:1.2.3:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.4
cpe:2.3:a:brickhost:phpscheduleit:1.2.4:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.5
cpe:2.3:a:brickhost:phpscheduleit:1.2.5:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.6
cpe:2.3:a:brickhost:phpscheduleit:1.2.6:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.7
cpe:2.3:a:brickhost:phpscheduleit:1.2.7:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.8
cpe:2.3:a:brickhost:phpscheduleit:1.2.8:*:*:*:*:*:*:*
brickhost
brickhost
>>phpscheduleit>>1.2.9
cpe:2.3:a:brickhost:phpscheduleit:1.2.9:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/reserve.php?r1=318&r2=328cve@mitre.org
N/A
http://secunia.com/advisories/32073cve@mitre.org
Vendor Advisory
http://sourceforge.net/project/shownotes.php?release_id=662749cve@mitre.org
N/A
http://www.exploit-db.com/exploits/18037cve@mitre.org
N/A
http://www.exploit-db.com/exploits/6646cve@mitre.org
N/A
http://www.osvdb.org/48797cve@mitre.org
N/A
http://www.securityfocus.com/bid/31520cve@mitre.org
Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/45617cve@mitre.org
N/A
Change History
0Changes found

Details not found