{"id":"CVE-2016-9135","details":"Exponent CMS 2.3.9 suffers from a SQL injection vulnerability in \"/framework/modules/help/controllers/helpController.php\" affecting the version parameter. Impact is Information Disclosure.","modified":"2026-02-06T22:37:03.818489Z","published":"2016-11-03T10:59:12.230Z","references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94127"},{"type":"ADVISORY","url":"https://github.com/exponentcms/exponent-cms/commit/d5c3c175b60bd26b2b74ec85b8f0d2544db2c8db"},{"type":"REPORT","url":"https://github.com/exponentcms/exponent-cms/commit/d5c3c175b60bd26b2b74ec85b8f0d2544db2c8db"},{"type":"FIX","url":"https://github.com/exponentcms/exponent-cms/commit/d5c3c175b60bd26b2b74ec85b8f0d2544db2c8db"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/exponentcms/exponent-cms","events":[{"introduced":"0"},{"fixed":"d5c3c175b60bd26b2b74ec85b8f0d2544db2c8db"}]}],"versions":["Beta1","beta1.1","v2.0.0","v2.0.0.beta2","v2.0.0.beta2.1","v2.0.0.beta3","v2.0.0.beta4","v2.0.0.release-candidate1","v2.0.0.release-candidate2","v2.0.1","v2.0.1patch1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.5patch1","v2.0.6","v2.0.6patch1","v2.0.6patch2","v2.0.7","v2.0.8","v2.0.8patch1","v2.0.8patch2","v2.0.9","v2.0.9patch1","v2.0.9patch2","v2.0.9patch3","v2.0.9patch4","v2.0.9patch5","v2.1.0","v2.1.1","v2.1.2","v2.1.3","v2.1.4","v2.1.4patch1","v2.2.0","v2.2.0alpha1","v2.2.0alpha2","v2.2.0alpha3","v2.2.0beta1","v2.2.0beta3","v2.2.0patch1","v2.2.0patch2","v2.2.0patch3","v2.2.0patch4","v2.2.0patch5","v2.2.1","v2.2.2","v2.2.2patch1","v2.2.2patch2","v2.2.3","v2.2.3patch1","v2.2.3patch2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9135.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}