Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c4qr-w7jh-9mf3

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

SQL injection vulnerability in index.php in DGBook 1.0, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the (1) name, (2) email, (3) homepage, (4) address, (5) comment, and (6) ip parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

SQL injection vulnerability in index.php in DGBook 1.0, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the (1) name, (2) email, (3) homepage, (4) address, (5) comment, and (6) ip parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

EPSS

Процентиль: 66%
0.00502
Низкий

Связанные уязвимости

nvd
больше 19 лет назад

SQL injection vulnerability in index.php in DGBook 1.0, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the (1) name, (2) email, (3) homepage, (4) address, (5) comment, and (6) ip parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

EPSS

Процентиль: 66%
0.00502
Низкий