Логотип exploitDog
bind:CVE-2014-5140
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-5140

Количество 2

Количество 2

nvd логотип

CVE-2014-5140

около 6 лет назад

The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-jq73-v9pp-jgx4

больше 3 лет назад

The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-5140

The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.

CVSS3: 8.8
1%
Низкий
около 6 лет назад
github логотип
GHSA-jq73-v9pp-jgx4

The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу