{"vulnerability": "cve-2008-1000", "sightings": [{"uuid": "2bb4d72c-b1fc-4093-a3e9-e6f003e61544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2008-1000", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/31412", "content": "", "creation_timestamp": "2008-03-17T00:00:00.000000Z"}, {"uuid": "3a1d6135-d085-452d-91a7-0849f9d72af0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-10001", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11829", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2008-10001\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: A vulnerability, which was classified as problematic, has been found in Pro2col Stingray FTS. The manipulation of the argument Username leads to cross site scripting. The attack may be initiated remotely. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer\n\ud83d\udccf Published: 2022-03-28T20:45:49.000Z\n\ud83d\udccf Modified: 2025-04-15T14:45:19.323Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.3809\n2. http://seclists.org/bugtraq/2008/Sep/0157.html", "creation_timestamp": "2025-04-15T14:55:12.000000Z"}, {"uuid": "3f38e0d0-56b5-48a1-8854-288d50507072", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-10004", "type": "seen", "source": "https://t.me/cibsecurity/59534", "content": "\u203c CVE-2008-10004 \u203c\n\nA vulnerability was found in Email Registration 5.x-2.1. It has been declared as critical. This vulnerability affects the function email_registration_user of the file email_registration.module. The manipulation of the argument namenew leads to sql injection. The attack can be initiated remotely. Upgrading to version 6.x-1.0 is able to address this issue. The name of the patch is 126c141b7db038c778a2dc931d38766aad8d1112. It is recommended to upgrade the affected component. VDB-222334 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T02:13:23.000000Z"}, {"uuid": "75c6e0df-dc75-4904-a71e-2c02dea924de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-10003", "type": "seen", "source": "https://t.me/cibsecurity/59428", "content": "\u203c CVE-2008-10003 \u203c\n\nA vulnerability was found in iGamingModules flashgames 1.1.0. It has been classified as critical. Affected is an unknown function of the file game.php. The manipulation of the argument lid leads to sql injection. It is possible to launch the attack remotely. The name of the patch is 6e57683704885be32eea2ea614f80c9bb8f012c5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222288.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-05T07:50:53.000000Z"}, {"uuid": "494f7de9-bc93-4845-86ce-6b73feaec4fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-10002", "type": "seen", "source": "https://t.me/cibsecurity/59427", "content": "\u203c CVE-2008-10002 \u203c\n\nA vulnerability has been found in cfire24 ajaxlife up to 0.3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.3.3 is able to address this issue. The name of the patch is 9fb53b67312fe3f4336e01c1e3e1bedb4be0c1c8. It is recommended to upgrade the affected component. VDB-222286 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-05T07:41:34.000000Z"}, {"uuid": "ef8f3810-c35a-4126-a873-7b5f8c185d89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-10001", "type": "seen", "source": "https://t.me/cibsecurity/39684", "content": "\u203c CVE-2008-10001 \u203c\n\n** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, has been found in Pro2col Stingray FTS. The manipulation of the argument Username leads to cross site scripting. The attack may be initiated remotely. It is recommended to upgrade the affected component. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T00:40:35.000000Z"}]}