CVE-2005-3819 – vTiger CRM 4.2 - SQL Injection
https://notcve.org/view.php?id=CVE-2005-3819
26 Nov 2005 — Multiple SQL injection vulnerabilities in vTiger CRM 4.2 and earlier allow remote attackers to inject arbitrary SQL commands and bypass authentication via the (1) user_name and (2) date parameter in the HelpDesk module. • https://www.exploit-db.com/exploits/26586 •
CVE-2005-3820
https://notcve.org/view.php?id=CVE-2005-3820
26 Nov 2005 — Multiple directory traversal vulnerabilities in index.php in vTiger CRM 4.2 and earlier allow remote attackers to read or include arbitrary files, an ultimately execute arbitrary PHP code, via .. (dot dot) and null byte ("%00") sequences in the (1) module parameter and (2) action parameter in the Leads module, as also demonstrated by injecting PHP code into log messages and accessing the log file. • http://marc.info/?l=full-disclosure&m=113290708121951&w=2 •
CVE-2005-3821
https://notcve.org/view.php?id=CVE-2005-3821
26 Nov 2005 — Cross-site scripting (XSS) vulnerability in vTiger CRM 4.2 and earlier allows remote attackers to inject arbitrary web script or HTML via multiple vectors, including the account name. • http://marc.info/?l=full-disclosure&m=113290708121951&w=2 •
CVE-2005-3822
https://notcve.org/view.php?id=CVE-2005-3822
26 Nov 2005 — Multiple SQL injection vulnerabilities in vTiger CRM 4.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) username in the login form or (2) record parameter, as demonstrated in the EditView action for the Contacts module. • http://marc.info/?l=full-disclosure&m=113290708121951&w=2 •
CVE-2005-3823
https://notcve.org/view.php?id=CVE-2005-3823
26 Nov 2005 — The Users module in vTiger CRM 4.2 and earlier allows remote attackers to execute arbitrary PHP code via an arbitrary file in the templatename parameter, which is passed to the eval function. • http://marc.info/?l=full-disclosure&m=113290708121951&w=2 •
CVE-2005-3824
https://notcve.org/view.php?id=CVE-2005-3824
26 Nov 2005 — The uploads module in vTiger CRM 4.2 and earlier allows remote attackers to upload arbitrary files, such as PHP files, via the add2db action. • http://marc.info/?l=full-disclosure&m=113290708121951&w=2 •