Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2007-1517
SQL injection vulnerability in comments.php in WSN Guest 1.02 and 1.21 allows remote attackers to execute arbitrary SQL commands via the id parameter.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.008
EPSS Ranking
73.3%
CVSS Severity
CVSS v2 Score
7.5
References
http://osvdb.org/34512
http://securityreason.com/securityalert/2451
http://www.securityfocus.com/archive/1/462814/100/0/threaded
http://www.securityfocus.com/bid/22969
http://www.vupen.com/english/advisories/2007/0968
https://exchange.xforce.ibmcloud.com/vulnerabilities/32983
https://www.exploit-db.com/exploits/3477
http://osvdb.org/34512
http://securityreason.com/securityalert/2451
http://www.securityfocus.com/archive/1/462814/100/0/threaded
http://www.securityfocus.com/bid/22969
http://www.vupen.com/english/advisories/2007/0968
https://exchange.xforce.ibmcloud.com/vulnerabilities/32983
https://www.exploit-db.com/exploits/3477
Products affected by CVE-2007-1517
Paul Knierim
»
Wsn Guest
»
Version:
1.21
cpe:2.3:a:paul_knierim:wsn_guest:1.21
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved