Description
Multiple SQL injection vulnerabilities in Haudenschilt Family Connections CMS (FCMS) 1.4 allow remote authenticated users to execute arbitrary SQL commands via the (1) address parameter to addressbook.php, the (2) getnews parameter to familynews.php, and the (3) poll_id parameter to home.php in a results action.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by CWH Underground · textwebappsphp
https://www.exploit-db.com/exploits/5811
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43097
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30680
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5811
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29722
Scores
EPSS
0.0041
EPSS Percentile
61.5%
Details
CWE
CWE-89
Status
published
Products (1)
haudenschilt/family_connections_cms
1.4
Published
Jun 30, 2008
Tracked Since
Feb 18, 2026