Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 18 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nextclickventures
Nextclickventures realtyscript |
|
| CPEs | cpe:2.3:a:nextclickventures:realtyscript:4.0.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Nextclickventures
Nextclickventures realtyscript |
Mon, 16 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Next Click Ventures
Next Click Ventures realtyscripts |
|
| Vendors & Products |
Next Click Ventures
Next Click Ventures realtyscripts |
Sun, 15 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Next Click Ventures RealtyScript 4.0.2 contains SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting arbitrary SQL code through the GET parameter 'u_id' in /admin/users.php and the POST parameter 'agent[]' in /admin/mailer.php. Attackers can exploit time-based blind SQL injection techniques to extract sensitive database information or cause denial of service through sleep-based payloads. | |
| Title | RealtyScript 4.0.2 SQL Injection via u_id and agent Parameters | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-16T14:30:30.626Z
Reserved: 2026-03-15T18:08:31.779Z
Link: CVE-2015-20121
Updated: 2026-03-16T14:21:07.849Z
Status : Analyzed
Published: 2026-03-16T14:17:48.160
Modified: 2026-03-18T15:24:32.517
Link: CVE-2015-20121
No data.
OpenCVE Enrichment
Updated: 2026-03-23T14:01:26Z