Vulnerability Name: | CVE-2008-1646 (CCN-41552) | ||||||||
Assigned: | 2008-03-31 | ||||||||
Published: | 2008-03-31 | ||||||||
Updated: | 2017-09-29 | ||||||||
Summary: | SQL injection vulnerability in wp-download.php in the WP-Download 1.2 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the dl_id parameter. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-89 | ||||||||
Vulnerability Consequences: | Data Manipulation | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-1646 Source: CCN Type: SA29608 WordPress WP-Download Plugin "dl_id" SQL Injection Source: SECUNIA Type: Vendor Advisory 29608 Source: CCN Type: WP-Download Web page WordPress Plugin : WP-Download Source: CCN Type: OSVDB ID: 43920 WP-Download Plugin for WordPress wp-download.php dl_id Parameter SQL Injection Source: BID Type: Exploit 28516 Source: CCN Type: BID-28516 WordPress 'wp-download' Plugin 'dl_id' Parameter SQL Injection Vulnerability Source: XF Type: UNKNOWN wpdownload-wpdownload-sql-injection(41552) Source: XF Type: UNKNOWN wpdownload-wpdownload-sql-injection(41552) Source: EXPLOIT-DB Type: UNKNOWN 5326 | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |