7.5
CVSSv2

CVE-2007-1517

Published: 20/03/2007 Updated: 16/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in comments.php in WSN Guest 1.02 and 1.21 allows remote malicious users to execute arbitrary SQL commands via the id parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

paul knierim wsn guest 1.21

Exploits

<!-- WSN Guest 121 Version CommentsPHP "ID" SQL Injection Exploit Type : SQL Injection Release Date : {2007-03-14} Product / Vendor : WSN Guestbook scriptswebmastersitenet/wsnguest/ Bug : localhost/script/commentsphp?id=-SQL Inj- SQL Injection Exploit : --> <title>WSN Guest 121 Version CommentsPHP "ID" ...