Логотип exploitDog
bind:CVE-2021-24630
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-24630

Количество 2

Количество 2

nvd логотип

CVE-2021-24630

больше 4 лет назад

The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-6xvw-4q6f-6756

больше 3 лет назад

The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-24630

The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author

CVSS3: 8.8
1%
Низкий
больше 4 лет назад
github логотип
GHSA-6xvw-4q6f-6756

The Schreikasten WordPress plugin through 0.14.18 does not sanitise or escape the id GET parameter before using it in SQL statements in the comments dashboard from various actions, leading to authenticated SQL Injections which can be exploited by users as low as author

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу