[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-7091Date: (C)2009-08-26   (M)2023-12-22


Multiple SQL injection vulnerabilities in Pligg 9.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requestTitle variable in a query to story.php; (5) requestID and (6) requestTitle variables in recommend.php; (7) categoryID parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
http://www.securityfocus.com/archive/1/494987/100/0/threaded
BID-30458
OSVDB-50189
OSVDB-50190
OSVDB-50191
OSVDB-50192
OSVDB-50193
OSVDB-50194
OSVDB-50195
OSVDB-50196
OSVDB-50197
OSVDB-50198
EXPLOIT-DB-6173
http://www.gulftech.org/?node=research&article_id=00120-07312008
pligg-multiple-sql-injection(44193)

CPE    2
cpe:/a:pligg:pligg_cms:9.5
cpe:/a:pligg:pligg_cms:9.9.0:beta
CWE    1
CWE-89

© SecPod Technologies