Description
TechyTalk Quick Chat WordPress Plugin All up to the latest is affected by: SQL Injection. The impact is: Access to the database. The component is: like_escape is used in Quick-chat.php line 399. The attack vector is: Crafted ajax request.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-1851 | TechyTalk Quick Chat WordPress Plugin All up to the latest is affected by: SQL Injection. The impact is: Access to the database. The component is: like_escape is used in Quick-chat.php line 399. The attack vector is: Crafted ajax request. |
References
| Link | Providers |
|---|---|
| https://metalamin.github.io/Quick-Chat-SQLi-EN/ |
|
History
No history.
Status: PUBLISHED
Assigner: dwf
Published:
Updated: 2024-08-05T03:07:18.415Z
Reserved: 2019-03-20T00:00:00.000Z
Link: CVE-2019-1010104
No data.
Status : Modified
Published: 2019-07-18T16:15:11.890
Modified: 2024-11-21T04:17:58.510
Link: CVE-2019-1010104
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD