VYPR
Unrated severityNVD Advisory· Published Aug 19, 2014· Updated May 6, 2026

CVE-2014-3906

CVE-2014-3906

Description

SQL injection vulnerability in OSK Advance-Flow 4.41 and earlier and Advance-Flow Forms 4.41 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in OSK Advance-Flow and Advance-Flow Forms versions 4.41 and earlier allows remote attackers to execute arbitrary SQL commands.

Vulnerability

OSK Advance-Flow and Advance-Flow Forms versions 4.41 and earlier contain a SQL injection vulnerability due to improper handling of input data. The flaw allows remote attackers to inject arbitrary SQL commands via unspecified vectors [1][2].

Exploitation

An attacker can exploit this vulnerability over the network without requiring authentication or user interaction. The attack complexity is low, making it easy to execute [2].

Impact

Successful exploitation allows an attacker to obtain or alter information in the database, leading to partial compromise of confidentiality, integrity, and availability [1][2].

Mitigation

The developer has discontinued support for Advance-Flow and recommends users stop using it. No patch is available. The successor product, eValue NS, is not affected [1][2].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

4
  • cpe:2.3:a:kk-osk:advance-flow:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:kk-osk:advance-flow:*:*:*:*:*:*:*:*range: <=4.41
    • (no CPE)range: <=4.41
  • cpe:2.3:a:kk-osk:advance-flow_forms:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:kk-osk:advance-flow_forms:*:*:*:*:*:*:*:*range: <=4.41
    • (no CPE)range: <=4.41

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.