// For flags

CVE-2008-0516

 

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

PHP remote file inclusion vulnerability in spaw/dialogs/confirm.php in SQLiteManager 1.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Vulnerabilidad de inclusión de archivo PHP remoto spaw/dialogs/confirm.php en SQLiteManager 1.2.0. Permite a atacantes remotos ejecutar código PHP arbitrario a través una URL en el parámetro spaw_root. NOTA: el origen de esta información es desconocido; los detalles se han obtenido solamente de información de terceros.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-01-31 CVE Reserved
  • 2008-01-31 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-09-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sqlite Manager
Search vendor "Sqlite Manager"
Sqlite Manager
Search vendor "Sqlite Manager" for product "Sqlite Manager"
1.2
Search vendor "Sqlite Manager" for product "Sqlite Manager" and version "1.2"
-
Affected