{"id":"CVE-2016-9087","details":"SQL injection vulnerability in framework/modules/filedownloads/controllers/filedownloadController.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the fileid parameter.","modified":"2026-02-24T11:15:59.017755Z","published":"2017-03-07T16:59:01.603Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/97271"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2016/Nov/12"},{"type":"ADVISORY","url":"https://github.com/exponentcms/exponent-cms/commit/fdafb5ec97838e4edbd685f587f28d3174ebb3db"},{"type":"REPORT","url":"https://github.com/exponentcms/exponent-cms/commit/fdafb5ec97838e4edbd685f587f28d3174ebb3db"},{"type":"FIX","url":"http://packetstormsecurity.com/files/139484/Exponent-CMS-2.3.9-SQL-Injection.html"},{"type":"FIX","url":"http://seclists.org/fulldisclosure/2016/Nov/12"},{"type":"FIX","url":"https://github.com/exponentcms/exponent-cms/commit/fdafb5ec97838e4edbd685f587f28d3174ebb3db"},{"type":"ARTICLE","url":"http://seclists.org/fulldisclosure/2016/Nov/12"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/exponentcms/exponent-cms","events":[{"introduced":"0"},{"last_affected":"e4f3d5129dac15d1d634008f504055e2cf062c65"}]}],"versions":["Beta1","beta1.1","v2.0.0","v2.0.0.beta2","v2.0.0.beta2.1","v2.0.0.beta3","v2.0.0.beta4","v2.0.0.release-candidate1","v2.0.0.release-candidate2","v2.0.1","v2.0.1patch1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.5patch1","v2.0.6","v2.0.6patch1","v2.0.6patch2","v2.0.7","v2.0.8","v2.0.8patch1","v2.0.8patch2","v2.0.9","v2.0.9patch1","v2.0.9patch2","v2.0.9patch3","v2.0.9patch4","v2.0.9patch5","v2.1.0","v2.1.1","v2.1.2","v2.1.3","v2.1.4","v2.1.4patch1","v2.2.0","v2.2.0alpha1","v2.2.0alpha2","v2.2.0alpha3","v2.2.0beta1","v2.2.0beta3","v2.2.0patch1","v2.2.0patch2","v2.2.0patch3","v2.2.0patch4","v2.2.0patch5","v2.2.1","v2.2.2","v2.2.2patch1","v2.2.2patch2","v2.2.3","v2.2.3patch1","v2.2.3patch2","v2.2.3patch3","v2.2.3patch4","v2.3.0","v2.3.0patch1","v2.3.0patch2","v2.3.0patch3","v2.3.0patch4","v2.3.1","v2.3.1patch4","v2.3.2","v2.3.2patch1","v2.3.2patch2","v2.3.3","v2.3.3patch1","v2.3.4","v2.3.4patch1","v2.3.5","v2.3.5patch1","v2.3.5patch2","v2.3.6","v2.3.7","v2.3.7patch1","v2.3.7patch2","v2.3.7patch3","v2.3.7patch4","v2.3.8","v2.3.8patch1","v2.3.8patch2","v2.3.8patch3","v2.3.8patch4","v2.3.8patch5","v2.3.8patch6","v2.3.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9087.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}