Логотип exploitDog
bind:CVE-2021-24758
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-24758

Количество 2

Количество 2

nvd логотип

CVE-2021-24758

около 4 лет назад

The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-3545-2cxj-jfvg

больше 3 лет назад

The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-24758

The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections

CVSS3: 8.8
1%
Низкий
около 4 лет назад
github логотип
GHSA-3545-2cxj-jfvg

The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу