Search criteria
2 vulnerabilities found for builder by downline_goldmine
CVE-2008-4178 (GCVE-0-2008-4178)
Vulnerability from nvd – Published: 2008-09-23 15:00 – Updated: 2024-08-07 10:08
VLAI?
Summary
SQL injection vulnerability in tr.php in DownlineGoldmine Special Category Addon, Downline Builder Pro, New Addon, and Downline Goldmine Builder allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
Date Public ?
2008-09-16 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:08:35.152Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "6947",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6947"
},
{
"name": "ADV-2008-2993",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2993"
},
{
"name": "ADV-2008-2992",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2992"
},
{
"name": "downlinegoldmine-tr-sql-injection(45128)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
},
{
"name": "31169",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/31169"
},
{
"name": "6950",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6950"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt"
},
{
"name": "6951",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6951"
},
{
"name": "ADV-2008-2995",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2995"
},
{
"name": "6946",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6946"
},
{
"name": "31812",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31812"
},
{
"name": "ADV-2008-2994",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2994"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in tr.php in DownlineGoldmine Special Category Addon, Downline Builder Pro, New Addon, and Downline Goldmine Builder allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "6947",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6947"
},
{
"name": "ADV-2008-2993",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2993"
},
{
"name": "ADV-2008-2992",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2992"
},
{
"name": "downlinegoldmine-tr-sql-injection(45128)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
},
{
"name": "31169",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/31169"
},
{
"name": "6950",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6950"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt"
},
{
"name": "6951",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6951"
},
{
"name": "ADV-2008-2995",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2995"
},
{
"name": "6946",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6946"
},
{
"name": "31812",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31812"
},
{
"name": "ADV-2008-2994",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2994"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-4178",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in tr.php in DownlineGoldmine Special Category Addon, Downline Builder Pro, New Addon, and Downline Goldmine Builder allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "6947",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6947"
},
{
"name": "ADV-2008-2993",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2993"
},
{
"name": "ADV-2008-2992",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2992"
},
{
"name": "downlinegoldmine-tr-sql-injection(45128)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
},
{
"name": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt",
"refsource": "MISC",
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
},
{
"name": "31169",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31169"
},
{
"name": "6950",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6950"
},
{
"name": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt",
"refsource": "MISC",
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt"
},
{
"name": "6951",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6951"
},
{
"name": "ADV-2008-2995",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2995"
},
{
"name": "6946",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6946"
},
{
"name": "31812",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31812"
},
{
"name": "ADV-2008-2994",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2994"
},
{
"name": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-4178",
"datePublished": "2008-09-23T15:00:00.000Z",
"dateReserved": "2008-09-23T00:00:00.000Z",
"dateUpdated": "2024-08-07T10:08:35.152Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-4178 (GCVE-0-2008-4178)
Vulnerability from cvelistv5 – Published: 2008-09-23 15:00 – Updated: 2024-08-07 10:08
VLAI?
Summary
SQL injection vulnerability in tr.php in DownlineGoldmine Special Category Addon, Downline Builder Pro, New Addon, and Downline Goldmine Builder allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
Date Public ?
2008-09-16 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T10:08:35.152Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "6947",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6947"
},
{
"name": "ADV-2008-2993",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2993"
},
{
"name": "ADV-2008-2992",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2992"
},
{
"name": "downlinegoldmine-tr-sql-injection(45128)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
},
{
"name": "31169",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/31169"
},
{
"name": "6950",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6950"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt"
},
{
"name": "6951",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6951"
},
{
"name": "ADV-2008-2995",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2995"
},
{
"name": "6946",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/6946"
},
{
"name": "31812",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31812"
},
{
"name": "ADV-2008-2994",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2994"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-09-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in tr.php in DownlineGoldmine Special Category Addon, Downline Builder Pro, New Addon, and Downline Goldmine Builder allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "6947",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6947"
},
{
"name": "ADV-2008-2993",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2993"
},
{
"name": "ADV-2008-2992",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2992"
},
{
"name": "downlinegoldmine-tr-sql-injection(45128)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
},
{
"name": "31169",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/31169"
},
{
"name": "6950",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6950"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt"
},
{
"name": "6951",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6951"
},
{
"name": "ADV-2008-2995",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2995"
},
{
"name": "6946",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/6946"
},
{
"name": "31812",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31812"
},
{
"name": "ADV-2008-2994",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2994"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-4178",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in tr.php in DownlineGoldmine Special Category Addon, Downline Builder Pro, New Addon, and Downline Goldmine Builder allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "6947",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6947"
},
{
"name": "ADV-2008-2993",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2993"
},
{
"name": "ADV-2008-2992",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2992"
},
{
"name": "downlinegoldmine-tr-sql-injection(45128)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45128"
},
{
"name": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt",
"refsource": "MISC",
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/downline-sql.txt"
},
{
"name": "31169",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31169"
},
{
"name": "6950",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6950"
},
{
"name": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt",
"refsource": "MISC",
"url": "http://packetstorm.linuxsecurity.com/0809-exploits/categoryaddon-sql.txt"
},
{
"name": "6951",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6951"
},
{
"name": "ADV-2008-2995",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2995"
},
{
"name": "6946",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6946"
},
{
"name": "31812",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31812"
},
{
"name": "ADV-2008-2994",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2994"
},
{
"name": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0809-exploits/newdownline-sql.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-4178",
"datePublished": "2008-09-23T15:00:00.000Z",
"dateReserved": "2008-09-23T00:00:00.000Z",
"dateUpdated": "2024-08-07T10:08:35.152Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}