Search criteria

6 vulnerabilities found for firestats by firestats

FKIE_CVE-2009-2143

Vulnerability from fkie_nvd - Published: 2009-06-22 14:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
PHP remote file inclusion vulnerability in firestats-wordpress.php in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the fs_javascript parameter.
Impacted products
Vendor Product Version
wordpress wordpress *
firestats firestats *
firestats firestats 0.9.0-beta
firestats firestats 0.9.1-beta
firestats firestats 0.9.2-beta
firestats firestats 0.9.3-beta
firestats firestats 0.9.4-beta
firestats firestats 0.9.5-beta
firestats firestats 0.9.6-beta
firestats firestats 0.9.7-beta
firestats firestats 0.9.8-beta
firestats firestats 0.9.9
firestats firestats 1.0
firestats firestats 1.0.0
firestats firestats 1.0.1
firestats firestats 1.0.2
firestats firestats 1.0.2
firestats firestats 1.1.1
firestats firestats 1.1.2
firestats firestats 1.1.3
firestats firestats 1.1.3
firestats firestats 1.1.4
firestats firestats 1.1.5
firestats firestats 1.1.6
firestats firestats 1.1.7
firestats firestats 1.1.8
firestats firestats 1.2.0-beta
firestats firestats 1.2.1
firestats firestats 1.2.2
firestats firestats 1.2.3
firestats firestats 1.2.4
firestats firestats 1.3.0-beta
firestats firestats 1.3.1-beta
firestats firestats 1.3.2-beta
firestats firestats 1.3.3-beta
firestats firestats 1.3.4
firestats firestats 1.3.5
firestats firestats 1.3.6
firestats firestats 1.4
firestats firestats 1.4.0-beta
firestats firestats 1.4.1-beta
firestats firestats 1.4.2-beta
firestats firestats 1.4.3
firestats firestats 1.4.4
firestats firestats 1.5
firestats firestats 1.5.0-beta
firestats firestats 1.5.1-beta
firestats firestats 1.5.2-beta
firestats firestats 1.5.3
firestats firestats 1.5.4
firestats firestats 1.5.5
firestats firestats 1.5.7
firestats firestats 1.5.8
firestats firestats 1.5.9
firestats firestats 1.5.10
firestats firestats 1.5.11
firestats firestats 1.5.12
firestats firestats 1.6
firestats firestats 1.6.0
firestats firestats 1.6.0
firestats firestats 1.6.0
firestats firestats 1.6.0
firestats firestats 1.6.0
firestats firestats 1.6.0
firestats firestats 1.6.0-beta1
firestats firestats 1.6.0-beta2
firestats firestats 1.6.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:firestats:firestats:*:stable:*:*:*:*:*:*",
              "matchCriteriaId": "3864C442-3C86-4849-B578-82BF3B0EAF25",
              "versionEndIncluding": "1.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE6D957-B6BC-48BB-8271-A8BE8CE7A16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F9730D-2D80-4980-BCDA-7D9C8A60C4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8B30AC1-BED9-4AF2-8577-EE0ACCF6A381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.3-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC277E53-0EA6-4724-B37B-8CD5AA906198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.4-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6E2D9C9-7BFB-45F0-8392-32610DB22EBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.5-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7666EAE-155A-46CA-B680-C11A625CA554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.6-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FE46205-1069-4EE2-9403-4051692C7EB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.7-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "A59D6986-EF12-4D72-A4FF-12E56EE4D178",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.8-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "1228D9C7-2113-46B0-A552-DF5C19B2E92D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:0.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA097B0-1C72-405F-8A0B-741410AE2ED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "563247B6-73E5-4244-8241-3F23C796A85A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F008C5BC-640F-4DB6-B348-453D9AE169C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "EAB57CB7-DD1C-4602-AF04-4B33A026EE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.0.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "73F97B76-4A8D-46AA-9C8C-8F66209A8ECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.0.2:stable:*:*:*:*:*:*",
              "matchCriteriaId": "31604ECC-AAB0-4703-859E-2C751EAFBD6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B7E00CBE-AF27-4AA1-85D8-1B43175A8E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6928328B-B3D2-49CA-B316-9F4C8244E92B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.1.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "0AC31A7A-F7B6-42BE-92EB-BC80C6E6BBDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.1.3:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "79ED5467-41E3-47C3-861E-C3A4EAB68724",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.1.4:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "63B2FD18-E414-4C73-8FD4-530CBA220750",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.1.5:stable:*:*:*:*:*:*",
              "matchCriteriaId": "8291513A-E222-4C6D-AA9D-C0FE81A1DBE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.1.6:stable:*:*:*:*:*:*",
              "matchCriteriaId": "6A7CD8AA-DE2D-4738-8F46-A860319AB99C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.1.7:stable:*:*:*:*:*:*",
              "matchCriteriaId": "B0F809B6-D0D6-468D-9F5E-B70CA40D25DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.1.8:stable:*:*:*:*:*:*",
              "matchCriteriaId": "A28BBF25-6063-4D97-8108-6EC7099C33ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.2.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "F20A5587-4C56-4F8F-A7D5-850F1CE893BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D64BC51F-DE97-4712-B80B-97D72B73BF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.2.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C3DEF83-6DAA-4E84-9022-B52A9CD84352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.2.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "32C2D594-ADE2-494B-B60F-13BF1139E59B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.2.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "76BC2452-4C98-4EA0-BE3C-2146C1BBA368",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.3.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0ED678-74B6-4FCA-A841-96408EEA9005",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.3.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "54302F44-00C0-4A28-A350-1F8FB05D9699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.3.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7BAE293-DA65-45DC-81E5-7C7D44480517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.3.3-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "F93BABAE-B7A7-4B7F-8F3F-24AF206D26F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.3.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "67AF857D-A116-4C05-99DA-350C017EB665",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.3.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FDFF47A8-6F99-4F2C-AFC4-5ACF69C451DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.3.6:stabe:*:*:*:*:*:*",
              "matchCriteriaId": "869E6E88-E159-446D-BEB3-585A88674B24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A40ED88-02AF-45F0-BB42-826789A16C04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.4.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8E571E-16BA-476D-92B7-42FEC94CE925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.4.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC9739F0-6748-4A86-9A71-94262F205BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.4.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "D97A6524-F671-47C1-A96A-5123158EE356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.4.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "76DF36C4-5A50-4B85-BFA4-C1571036BD19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.4.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "BF98BC94-B207-41E9-9BA2-F2F73C8A4008",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A96892-379C-4583-B0F4-5457E82D9D75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7F94179-58C7-462E-882D-B94435CD907A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB9F970-7307-4539-A1A0-2DD14D333A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8CA6FF0-CD5B-435C-ADD3-4C28293DE70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D3E66F67-951D-4104-AC1D-E6106C4197F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7B14DE75-DCBF-4D29-AC8C-64B005A0BCF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.5:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A881746E-715B-4186-9D25-33F8E25B8344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4B8F8A5D-A836-40B3-9069-7CB249C797BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B364FC45-77AC-4C0B-AA37-A97610F05FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "D43B703A-73B9-40D0-93AA-22C1E04C8098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.10:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "CFDDA5E1-AE01-4A24-A8EA-1EC7EAA71C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.11:stable:*:*:*:*:*:*",
              "matchCriteriaId": "1269D6F0-7782-4B70-8A72-AC864A629257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.5.12:stable:*:*:*:*:*:*",
              "matchCriteriaId": "B18F9AD0-6FD6-45B7-A686-C777F6EF46EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE568395-643C-4261-BCC2-CDDFCF44039E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F99809A-95DF-4066-9589-83885CBF4661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0648CC68-2E6C-4BF9-A30B-9B5BEF72D705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0EE87737-44E2-4477-95E6-2199CCFC06DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1A0B9641-0674-4E23-8436-30C6B7C4241B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "56A858FF-4F5D-409C-8DC8-65B1680AF220",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:stable:*:*:*:*:*:*",
              "matchCriteriaId": "09AD7D16-6A82-4AAE-B8F9-D74FACF5CF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0-beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B435D3-AFAB-4A33-B9EC-9C647A615712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0-beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D85F8E8A-F19C-48FC-BFD3-B8DE60B2D1F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECD5EA0-58F8-4A8C-8C55-C8504AFB1F45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PHP remote file inclusion vulnerability in firestats-wordpress.php in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the fs_javascript parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inclusi\u00f3n de fichero remoto PHP en firestats-wordpress.ph del plugin FireStats de WordPress en sus versiones anteriores a 1.6.2-stable. Permite a usuarios remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de una URL en el par\u00e1metro fs_javscript."
    }
  ],
  "id": "CVE-2009-2143",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-06-22T14:30:00.250",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35400"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/8945"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/8945"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-2144

Vulnerability from fkie_nvd - Published: 2009-06-22 14:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Impacted products
Vendor Product Version
edgewall firestats *
edgewall firestats 0.9.0-beta
edgewall firestats 0.9.1-beta
edgewall firestats 0.9.2-beta
edgewall firestats 0.9.3-beta
edgewall firestats 0.9.4-beta
edgewall firestats 0.9.5-beta
edgewall firestats 0.9.6-beta
edgewall firestats 0.9.7-beta
edgewall firestats 0.9.8-beta
edgewall firestats 0.9.9
edgewall firestats 1.0
edgewall firestats 1.0.0
edgewall firestats 1.0.1
edgewall firestats 1.0.2
edgewall firestats 1.0.2
edgewall firestats 1.1.1
edgewall firestats 1.1.2
edgewall firestats 1.1.3
edgewall firestats 1.1.3
edgewall firestats 1.1.4
edgewall firestats 1.1.5
edgewall firestats 1.1.6
edgewall firestats 1.1.7
edgewall firestats 1.1.8
edgewall firestats 1.2.0-beta
edgewall firestats 1.2.1
edgewall firestats 1.2.2
edgewall firestats 1.2.3
edgewall firestats 1.2.4
edgewall firestats 1.3.0-beta
edgewall firestats 1.3.1-beta
edgewall firestats 1.3.2-beta
edgewall firestats 1.3.3-beta
edgewall firestats 1.3.4
edgewall firestats 1.3.5
edgewall firestats 1.3.6
edgewall firestats 1.4
edgewall firestats 1.4.0-beta
edgewall firestats 1.4.1-beta
edgewall firestats 1.4.2-beta
edgewall firestats 1.4.3
edgewall firestats 1.4.4
edgewall firestats 1.5
edgewall firestats 1.5.0-beta
edgewall firestats 1.5.1-beta
edgewall firestats 1.5.2-beta
edgewall firestats 1.5.3
edgewall firestats 1.5.4
edgewall firestats 1.5.5
edgewall firestats 1.5.6-beta
edgewall firestats 1.5.7
edgewall firestats 1.5.8
edgewall firestats 1.5.9
edgewall firestats 1.5.10
edgewall firestats 1.5.12
edgewall firestats 1.6
edgewall firestats 1.6.0
edgewall firestats 1.6.0-beta1
edgewall firestats 1.6.0-beta2
edgewall firestats 11.5.11
firestats firestats 1.6.0
firestats firestats 1.6.0
firestats firestats 1.6.0
firestats firestats 1.6.0
wordpress wordpress *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:*:stable:*:*:*:*:*:*",
              "matchCriteriaId": "E834AA0F-78A7-4C21-AF11-DA09482B4614",
              "versionEndIncluding": "1.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13B729-A9FF-4045-ACD2-4B2F254173AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CEA2DDD-745A-4559-AB55-237604BC862D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD2B1DE5-0AC5-43A2-AAB8-FFFA0235E983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.3-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "85000821-FFEB-4172-BD92-F6C3A9F7E7DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.4-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "58531C75-B209-4456-B61E-C212879F6DE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.5-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC78A4E-CDE7-465B-AB24-3A4F1D47CE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.6-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0942444-A2A6-45EE-93D2-E1A36CBA5FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.7-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "9668A006-8EAC-480A-AEA1-9DB5EB3BDD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.8-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D1C55D-77F1-428B-900E-FC9A707B8A79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:0.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CCD33F6-492C-4A63-A67F-E775564EEA72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "78180E71-45AE-4DCC-BBEC-A102E392BB6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "42F502F3-12EC-4CD3-ADEA-B77E7275944E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8AA33956-2F76-49ED-82A4-C5B50538C5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "CCE1CB60-B9D0-4EDE-BEF2-FCF3015047ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.0.2:stable:*:*:*:*:*:*",
              "matchCriteriaId": "43CBFABF-1751-44DA-814B-E9979C85FE5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "54B0F88F-2108-4A66-B95D-E633BC4495F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4D2AC337-B91E-4F76-9C26-4113651E6C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "12E0E879-2551-4EB8-9CB5-5DC679E58095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.3:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2932101C-AD8A-45DC-9834-22132B0E9E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.4:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "CC2D01A0-1A37-462C-AA10-31E0AC3D09E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.5:stable:*:*:*:*:*:*",
              "matchCriteriaId": "CD952288-BA3B-43C7-9D0F-0A1C188334F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.6:stable:*:*:*:*:*:*",
              "matchCriteriaId": "F9CF38E1-CDB6-4A82-AC14-4FCAD9C978BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.7:stable:*:*:*:*:*:*",
              "matchCriteriaId": "C27D5D73-5703-4DD2-BA3F-801A05E31F62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.1.8:stable:*:*:*:*:*:*",
              "matchCriteriaId": "566A5E2D-FF35-4354-A054-9D0028B75BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FAEAFE0-4768-404D-ACFF-344C40777503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D163C9BE-33A0-48CE-AB37-D64454F1AFE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "3448D772-6C68-4D0D-AED4-888D99B231DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "36613FE7-A554-4056-B714-471013A35C5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.2.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "8DE9ED08-9006-4961-971B-06C3CEA49458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A3AB32B-A9DD-463C-98FA-AA017E43C0CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "87180A73-A925-4D90-896A-B25176C37B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "8795EAF1-18C1-482B-8656-180162DAD828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.3-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C84E75B-40D3-4A69-8E20-ADE1DDEAE66F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "26BA547B-145F-4CEA-909D-23A850D0FA7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BABAF387-0758-4F21-BD63-F2AA5A66069A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.3.6:stable:*:*:*:*:*:*",
              "matchCriteriaId": "932A8BE4-1911-4E10-8E13-DF19C70E388C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B40F57A1-B0DB-4E91-8A8C-AE7BF6FBA9B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B339B69-E720-408A-9581-29A89914E1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B450CC8-96D1-42A4-970F-522180063491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8DE124-1344-497C-A88C-6BF3F3511B4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7FB55923-22D5-42AA-A1A8-A355E4D74557",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.4.4:stable:*:*:*:*:*:*",
              "matchCriteriaId": "D8020B0B-4630-4AC4-A550-32C3DEBFDE03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4BC758-5BA9-4EA4-AD2B-36BB980458A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.0-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "F44EA1CF-2326-4EBF-8D6C-6FD8E6A5D93D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.1-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDFD7E8E-10AE-4C55-8AF6-058A5DC89D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.2-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E247C0B-030B-4EDB-A0E8-1E21D1379CB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "2A8AD03D-B664-4B9F-8F55-BD55B8CFEB3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0B6D5C49-0F49-4987-82AB-0234C08D421F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.5:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "B485D62A-91F9-4B60-B43F-625C23F28809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.6-beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F0B95AE-1A78-49BF-B0F7-AC2083CE6C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8D39C430-25BF-498B-85C2-54028D591B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "22CA6661-3DD2-4474-9B83-7F04E4A379D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.9:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FCB32DF8-ED42-40EE-AF6F-37B264CB1440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.10:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "10D7FF58-8139-4E3E-B59D-0F2909B5FE8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.5.12:stable:*:*:*:*:*:*",
              "matchCriteriaId": "7D31D76B-5505-4421-B7F4-854523326507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E108764-791B-4ADD-9F57-46BA575C70F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.6.0:stable:*:*:*:*:*:*",
              "matchCriteriaId": "8C65DADE-051C-4B67-8CC1-B1836553329C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.6.0-beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7781843F-C9AF-4925-8456-36A9FA0AF675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:1.6.0-beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD9BC1A-82FE-43A5-AC60-48DD0617DACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:edgewall:firestats:11.5.11:stable:*:*:*:*:*:*",
              "matchCriteriaId": "4C365F10-CD01-4D70-9655-756FFEBBDD4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0648CC68-2E6C-4BF9-A30B-9B5BEF72D705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0EE87737-44E2-4477-95E6-2199CCFC06DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1A0B9641-0674-4E23-8436-30C6B7C4241B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:firestats:firestats:1.6.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "56A858FF-4F5D-409C-8DC8-65B1680AF220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en el plugin FireStats en sus versiones anteriores a 1.6.2-stable de WordPress permite a usuarios remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de vectores de ataque desconocidos."
    }
  ],
  "id": "CVE-2009-2144",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-06-22T14:30:00.267",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35400"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2009-2143 (GCVE-0-2009-2143)

Vulnerability from cvelistv5 – Published: 2009-06-22 14:00 – Updated: 2024-08-07 05:36
VLAI?
Summary
PHP remote file inclusion vulnerability in firestats-wordpress.php in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the fs_javascript parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://firestats.cc/wiki/ChangeLog#a1.6.2-stable1… x_refsource_CONFIRM
http://secunia.com/advisories/35400 third-party-advisoryx_refsource_SECUNIA
https://www.exploit-db.com/exploits/8945 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:36:21.039Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
          },
          {
            "name": "35400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35400"
          },
          {
            "name": "8945",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8945"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file inclusion vulnerability in firestats-wordpress.php in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the fs_javascript parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
        },
        {
          "name": "35400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35400"
        },
        {
          "name": "8945",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8945"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2143",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PHP remote file inclusion vulnerability in firestats-wordpress.php in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the fs_javascript parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009",
              "refsource": "CONFIRM",
              "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
            },
            {
              "name": "35400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35400"
            },
            {
              "name": "8945",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8945"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2143",
    "datePublished": "2009-06-22T14:00:00",
    "dateReserved": "2009-06-22T00:00:00",
    "dateUpdated": "2024-08-07T05:36:21.039Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2144 (GCVE-0-2009-2144)

Vulnerability from cvelistv5 – Published: 2009-06-22 14:00 – Updated: 2024-09-16 22:02
VLAI?
Summary
SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://firestats.cc/wiki/ChangeLog#a1.6.2-stable1… x_refsource_CONFIRM
http://secunia.com/advisories/35400 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:36:21.014Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
          },
          {
            "name": "35400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35400"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-06-22T14:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
        },
        {
          "name": "35400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35400"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009",
              "refsource": "CONFIRM",
              "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
            },
            {
              "name": "35400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35400"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2144",
    "datePublished": "2009-06-22T14:00:00Z",
    "dateReserved": "2009-06-22T00:00:00Z",
    "dateUpdated": "2024-09-16T22:02:08.499Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2143 (GCVE-0-2009-2143)

Vulnerability from nvd – Published: 2009-06-22 14:00 – Updated: 2024-08-07 05:36
VLAI?
Summary
PHP remote file inclusion vulnerability in firestats-wordpress.php in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the fs_javascript parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://firestats.cc/wiki/ChangeLog#a1.6.2-stable1… x_refsource_CONFIRM
http://secunia.com/advisories/35400 third-party-advisoryx_refsource_SECUNIA
https://www.exploit-db.com/exploits/8945 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:36:21.039Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
          },
          {
            "name": "35400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35400"
          },
          {
            "name": "8945",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8945"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-06-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file inclusion vulnerability in firestats-wordpress.php in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the fs_javascript parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
        },
        {
          "name": "35400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35400"
        },
        {
          "name": "8945",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8945"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2143",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PHP remote file inclusion vulnerability in firestats-wordpress.php in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the fs_javascript parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009",
              "refsource": "CONFIRM",
              "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
            },
            {
              "name": "35400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35400"
            },
            {
              "name": "8945",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8945"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2143",
    "datePublished": "2009-06-22T14:00:00",
    "dateReserved": "2009-06-22T00:00:00",
    "dateUpdated": "2024-08-07T05:36:21.039Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2144 (GCVE-0-2009-2144)

Vulnerability from nvd – Published: 2009-06-22 14:00 – Updated: 2024-09-16 22:02
VLAI?
Summary
SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://firestats.cc/wiki/ChangeLog#a1.6.2-stable1… x_refsource_CONFIRM
http://secunia.com/advisories/35400 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:36:21.014Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
          },
          {
            "name": "35400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35400"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-06-22T14:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
        },
        {
          "name": "35400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35400"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the FireStats plugin before 1.6.2-stable for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009",
              "refsource": "CONFIRM",
              "url": "http://firestats.cc/wiki/ChangeLog#a1.6.2-stable13062009"
            },
            {
              "name": "35400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35400"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2144",
    "datePublished": "2009-06-22T14:00:00Z",
    "dateReserved": "2009-06-22T00:00:00Z",
    "dateUpdated": "2024-09-16T22:02:08.499Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}