Search criteria

3 vulnerabilities found for firestats by edgewall

FKIE_CVE-2009-2144

Vulnerability from fkie_nvd - Published: 2009-06-22 14:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Impacted products
Vendor Product Version
edgewall firestats *
edgewall firestats 0.9.0-beta
edgewall firestats 0.9.1-beta
edgewall firestats 0.9.2-beta
edgewall firestats 0.9.3-beta
edgewall firestats 0.9.4-beta
edgewall firestats 0.9.5-beta
edgewall firestats 0.9.6-beta
edgewall firestats 0.9.7-beta
edgewall firestats 0.9.8-beta
edgewall firestats 0.9.9
edgewall firestats 1.0
edgewall firestats 1.0.0
edgewall firestats 1.0.1
edgewall firestats 1.0.2
edgewall firestats 1.0.2
edgewall firestats 1.1.1
edgewall firestats 1.1.2
edgewall firestats 1.1.3
edgewall firestats 1.1.3
edgewall firestats 1.1.4
edgewall firestats 1.1.5
edgewall firestats 1.1.6
edgewall firestats 1.1.7
edgewall firestats 1.1.8
edgewall firestats 1.2.0-beta
edgewall firestats 1.2.1
edgewall firestats 1.2.2
edgewall firestats 1.2.3
edgewall firestats 1.2.4
edgewall firestats 1.3.0-beta
edgewall firestats 1.3.1-beta
edgewall firestats 1.3.2-beta
edgewall firestats 1.3.3-beta
edgewall firestats 1.3.4
edgewall firestats 1.3.5
edgewall firestats 1.3.6
edgewall firestats 1.4
edgewall firestats 1.4.0-beta
edgewall firestats 1.4.1-beta
edgewall firestats 1.4.2-beta
edgewall firestats 1.4.3
edgewall firestats 1.4.4
edgewall firestats 1.5
edgewall firestats 1.5.0-beta
edgewall firestats 1.5.1-beta
edgewall firestats 1.5.2-beta
edgewall firestats 1.5.3
edgewall firestats 1.5.4
edgewall firestats 1.5.5
edgewall firestats 1.5.6-beta
edgewall firestats 1.5.7
edgewall firestats 1.5.8
edgewall firestats 1.5.9
edgewall firestats 1.5.10
edgewall firestats 1.5.12
edgewall firestats 1.6
edgewall firestats 1.6.0
edgewall firestats 1.6.0-beta1
edgewall firestats 1.6.0-beta2
edgewall firestats 11.5.11
firestats firestats 1.6.0
firestats firestats 1.6.0
firestats firestats 1.6.0
firestats firestats 1.6.0
wordpress wordpress *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:*:stable:*:*:*:*:*:*",
              "matchCriteriaId": "E834AA0F-78A7-4C21-AF11-DA09482B4614",
              "versionEndIncluding": "1.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13B729-A9FF-4045-ACD2-4B2F254173AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CEA2DDD-745A-4559-AB55-237604BC862D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2B1DE5-0AC5-43A2-AAB8-FFFA0235E983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.3-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "85000821-FFEB-4172-BD92-F6C3A9F7E7DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.4-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "58531C75-B209-4456-B61E-C212879F6DE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.5-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC78A4E-CDE7-465B-AB24-3A4F1D47CE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.6-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0942444-A2A6-45EE-93D2-E1A36CBA5FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.7-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "9668A006-8EAC-480A-AEA1-9DB5EB3BDD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.8-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D1C55D-77F1-428B-900E-FC9A707B8A79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CCD33F6-492C-4A63-A67F-E775564EEA72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "78180E71-45AE-4DCC-BBEC-A102E392BB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "42F502F3-12EC-4CD3-ADEA-B77E7275944E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8AA33956-2F76-49ED-82A4-C5B50538C5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "CCE1CB60-B9D0-4EDE-BEF2-FCF3015047ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0.2:stable:*:*:*:*:*:*",
              "matchCriteriaId": "43CBFABF-1751-44DA-814B-E9979C85FE5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "54B0F88F-2108-4A66-B95D-E633BC4495F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4D2AC337-B91E-4F76-9C26-4113651E6C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "12E0E879-2551-4EB8-9CB5-5DC679E58095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.3:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2932101C-AD8A-45DC-9834-22132B0E9E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.4:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "CC2D01A0-1A37-462C-AA10-31E0AC3D09E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.5:stable:*:*:*:*:*:*",
              "matchCriteriaId": "CD952288-BA3B-43C7-9D0F-0A1C188334F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.6:stable:*:*:*:*:*:*",
              "matchCriteriaId": "F9CF38E1-CDB6-4A82-AC14-4FCAD9C978BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.7:stable:*:*:*:*:*:*",
              "matchCriteriaId": "C27D5D73-5703-4DD2-BA3F-801A05E31F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.8:stable:*:*:*:*:*:*",
              "matchCriteriaId": "566A5E2D-FF35-4354-A054-9D0028B75BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FAEAFE0-4768-404D-ACFF-344C40777503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D163C9BE-33A0-48CE-AB37-D64454F1AFE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3448D772-6C68-4D0D-AED4-888D99B231DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "36613FE7-A554-4056-B714-471013A35C5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "8DE9ED08-9006-4961-971B-06C3CEA49458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A3AB32B-A9DD-463C-98FA-AA017E43C0CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "87180A73-A925-4D90-896A-B25176C37B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "8795EAF1-18C1-482B-8656-180162DAD828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.3-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C84E75B-40D3-4A69-8E20-ADE1DDEAE66F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "26BA547B-145F-4CEA-909D-23A850D0FA7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BABAF387-0758-4F21-BD63-F2AA5A66069A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.6:stable:*:*:*:*:*:*",
              "matchCriteriaId": "932A8BE4-1911-4E10-8E13-DF19C70E388C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B40F57A1-B0DB-4E91-8A8C-AE7BF6FBA9B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B339B69-E720-408A-9581-29A89914E1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B450CC8-96D1-42A4-970F-522180063491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8DE124-1344-497C-A88C-6BF3F3511B4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7FB55923-22D5-42AA-A1A8-A355E4D74557",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "D8020B0B-4630-4AC4-A550-32C3DEBFDE03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4BC758-5BA9-4EA4-AD2B-36BB980458A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "F44EA1CF-2326-4EBF-8D6C-6FD8E6A5D93D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDFD7E8E-10AE-4C55-8AF6-058A5DC89D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E247C0B-030B-4EDB-A0E8-1E21D1379CB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "2A8AD03D-B664-4B9F-8F55-BD55B8CFEB3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0B6D5C49-0F49-4987-82AB-0234C08D421F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.5:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "B485D62A-91F9-4B60-B43F-625C23F28809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.6-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F0B95AE-1A78-49BF-B0F7-AC2083CE6C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8D39C430-25BF-498B-85C2-54028D591B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "22CA6661-3DD2-4474-9B83-7F04E4A379D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FCB32DF8-ED42-40EE-AF6F-37B264CB1440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.10:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "10D7FF58-8139-4E3E-B59D-0F2909B5FE8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.12:stable:*:*:*:*:*:*",
              "matchCriteriaId": "7D31D76B-5505-4421-B7F4-854523326507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E108764-791B-4ADD-9F57-46BA575C70F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.6.0:stable:*:*:*:*:*:*",
              "matchCriteriaId": "8C65DADE-051C-4B67-8CC1-B1836553329C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.6.0-beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7781843F-C9AF-4925-8456-36A9FA0AF675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.6.0-beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD9BC1A-82FE-43A5-AC60-48DD0617DACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:11.5.11:stable:*:*:*:*:*:*",
              "matchCriteriaId": "4C365F10-CD01-4D70-9655-756FFEBBDD4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0648CC68-2E6C-4BF9-A30B-9B5BEF72D705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0EE87737-44E2-4477-95E6-2199CCFC06DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1A0B9641-0674-4E23-8436-30C6B7C4241B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "56A858FF-4F5D-409C-8DC8-65B1680AF220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en el plugin FireStats en sus versiones anteriores a 1.6.2-stable de WordPress permite a usuarios remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de vectores de ataque desconocidos."
    }
  ],
  "id": "CVE-2009-2144",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-06-22T14:30:00.267",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35400"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2009-2144 (GCVE-0-2009-2144)

Vulnerability from cvelistv5 – Published: 2009-06-22 14:00 – Updated: 2024-09-16 22:02
VLAI?
Summary
SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://firestats.cc/wiki/ChangeLog#a1.6.2-stable1… x_refsource_CONFIRM
http://secunia.com/advisories/35400 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:36:21.014Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
          },
          {
            "name": "35400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35400"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-06-22T14:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
        },
        {
          "name": "35400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35400"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009",
              "refsource": "CONFIRM",
              "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
            },
            {
              "name": "35400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35400"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2144",
    "datePublished": "2009-06-22T14:00:00Z",
    "dateReserved": "2009-06-22T00:00:00Z",
    "dateUpdated": "2024-09-16T22:02:08.499Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2144 (GCVE-0-2009-2144)

Vulnerability from nvd – Published: 2009-06-22 14:00 – Updated: 2024-09-16 22:02
VLAI?
Summary
SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://firestats.cc/wiki/ChangeLog#a1.6.2-stable1… x_refsource_CONFIRM
http://secunia.com/advisories/35400 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:36:21.014Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
          },
          {
            "name": "35400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35400"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-06-22T14:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
        },
        {
          "name": "35400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35400"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009",
              "refsource": "CONFIRM",
              "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
            },
            {
              "name": "35400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35400"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2144",
    "datePublished": "2009-06-22T14:00:00Z",
    "dateReserved": "2009-06-22T00:00:00Z",
    "dateUpdated": "2024-09-16T22:02:08.499Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}