7.5
CVSSv2

CVE-2008-7091

Published: 26/08/2009 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in Pligg 9.9 and previous versions allow remote malicious users to execute arbitrary SQL commands via the (1) id parameter to vote.php, which is not properly handled in libs/link.php; (2) id parameter to trackback.php; (3) an unspecified parameter to submit.php; (4) requestTitle variable in a query to story.php; (5) requestID and (6) requestTitle variables in recommend.php; (7) categoryID parameter to cloud.php; (8) title parameter to out.php; (9) username parameter to login.php; (10) id parameter to cvote.php; and (11) commentid parameter to edit.php.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

pligg pligg cms 9.9.0

pligg pligg cms

pligg pligg cms 9.5

Exploits

#!/usr/bin/perl -w use LWP::UserAgent; use MIME::Base64; use Digest::MD5 qw(md5_hex); use Getopt::Std; getopts('h:', \%args); print "#############################################\n"; print "# Pligg <= 99 Remote Code Execution Exploit \n"; print "#############################################\n"; #dork = "Powered By Pligg" + "Legal: License and ...
########################################################## # GulfTech Security Research July 30, 2008 ########################################################## # Vendor : Pligg LLC # URL : wwwpliggcom/ # Version : Pligg <= 99 # Risk : Multiple Vulnerabilities ########################################################## ...