Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 07 Oct 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wow-company viral Signup
|
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:wow-company:viral_signup:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wow-company viral Signup
|
Wed, 04 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wow-company
Wow-company viral-signup |
|
| CPEs | cpe:2.3:a:wow-company:viral-signup:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wow-company
Wow-company viral-signup |
|
| Metrics |
cvssV3_1
|
Wed, 04 Sep 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Viral Signup WordPress plugin through 2.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection | |
| Title | Viral Signup <= 2.1 - Unauthenticated SQLi | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-09-04T14:19:49.867Z
Reserved: 2024-07-19T19:37:55.347Z
Link: CVE-2024-6926
Updated: 2024-09-04T14:19:39.748Z
Status : Analyzed
Published: 2024-09-04T06:15:17.537
Modified: 2024-10-07T15:29:08.993
Link: CVE-2024-6926
No data.
OpenCVE Enrichment
No data.