{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-08-16T00:00:00.000Z","descriptions":[{"lang":"en","value":"Eval injection vulnerability in globalsoff.php in Turnkey PHP Live Helper 2.0.1 and earlier allows remote attackers to execute arbitrary PHP code via the test parameter, and probably arbitrary parameters, to chat.php."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-11T19:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"6261","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/6261"},{"name":"4178","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/4178"},{"name":"20080816 PHP Live Helper <= 2.0.1 Multiple Vulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/495542/100/0/threaded"},{"name":"30729","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/30729"},{"tags":["x_refsource_MISC"],"url":"http://demos.turnkeywebtools.com/phplivehelper/docs/change_log.txt"},{"name":"31521","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/31521"},{"name":"phplivehelper-chat-code-execution(44571)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44571"},{"tags":["x_refsource_MISC"],"url":"http://www.gulftech.org/?node=research&article_id=00124-08162008"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-3764","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Eval injection vulnerability in globalsoff.php in Turnkey PHP Live Helper 2.0.1 and earlier allows remote attackers to execute arbitrary PHP code via the test parameter, and probably arbitrary parameters, to chat.php."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"6261","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/6261"},{"name":"4178","refsource":"SREASON","url":"http://securityreason.com/securityalert/4178"},{"name":"20080816 PHP Live Helper <= 2.0.1 Multiple Vulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/495542/100/0/threaded"},{"name":"30729","refsource":"BID","url":"http://www.securityfocus.com/bid/30729"},{"name":"http://demos.turnkeywebtools.com/phplivehelper/docs/change_log.txt","refsource":"MISC","url":"http://demos.turnkeywebtools.com/phplivehelper/docs/change_log.txt"},{"name":"31521","refsource":"SECUNIA","url":"http://secunia.com/advisories/31521"},{"name":"phplivehelper-chat-code-execution(44571)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44571"},{"name":"http://www.gulftech.org/?node=research&article_id=00124-08162008","refsource":"MISC","url":"http://www.gulftech.org/?node=research&article_id=00124-08162008"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T09:52:59.926Z"},"title":"CVE Program Container","references":[{"name":"6261","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/6261"},{"name":"4178","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/4178"},{"name":"20080816 PHP Live Helper <= 2.0.1 Multiple Vulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/495542/100/0/threaded"},{"name":"30729","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/30729"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://demos.turnkeywebtools.com/phplivehelper/docs/change_log.txt"},{"name":"31521","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/31521"},{"name":"phplivehelper-chat-code-execution(44571)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44571"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.gulftech.org/?node=research&article_id=00124-08162008"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-3764","datePublished":"2008-08-21T17:00:00.000Z","dateReserved":"2008-08-21T00:00:00.000Z","dateUpdated":"2024-08-07T09:52:59.926Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}