Description
The DiveBook plugin 1.1.4 for WordPress was prone to a SQL injection within divelog.php, allowing unauthenticated users to retrieve data from the database via the divelog.php filter_diver parameter.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-6361 | The DiveBook plugin 1.1.4 for WordPress was prone to a SQL injection within divelog.php, allowing unauthenticated users to retrieve data from the database via the divelog.php filter_diver parameter. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:39:36.182Z
Reserved: 2020-06-16T00:00:00.000Z
Link: CVE-2020-14207
No data.
Status : Modified
Published: 2020-12-08T20:15:15.387
Modified: 2024-11-21T05:02:52.213
Link: CVE-2020-14207
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD