{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:51:30.955","vulnerabilities":[{"cve":{"id":"CVE-2008-1613","sourceIdentifier":"cve@mitre.org","published":"2008-04-22T04:41:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in ioRD.asp in RedDot CMS 7.5 Build 7.5.0.48, and possibly other versions including 6.5 and 7.0, allows remote attackers to execute arbitrary SQL commands via the LngId parameter."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en RD.asp de RedDot CMS 7.5 Build 7.5.0.48, y posiblemente otras versiones incluyendo 6.5 y 7.0, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro LngId."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:reddot:cms:6.5:*:*:*:*:*:*:*","matchCriteriaId":"9625E4A6-4BD9-4BB9-B766-343FB936EED1"},{"vulnerable":true,"criteria":"cpe:2.3:a:reddot:cms:7.0:*:*:*:*:*:*:*","matchCriteriaId":"7CBA2389-D719-4FC3-82E9-25D53744DB25"},{"vulnerable":true,"criteria":"cpe:2.3:a:reddot:cms:7.5:build_7.5.0.48:*:*:*:*:*:*","matchCriteriaId":"ECC6FE8B-66CE-49BD-92E3-1C3034D7073C"}]}]}],"references":[{"url":"http://secunia.com/advisories/29843","source":"cve@mitre.org"},{"url":"http://www.irmplc.com/index.php/167-Advisory-026","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/491139/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/28872","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41924","source":"cve@mitre.org"},{"url":"https://www.exploit-db.com/exploits/5482","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/29843","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.irmplc.com/index.php/167-Advisory-026","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/491139/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/28872","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41924","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/5482","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}