CVE-2011-5224

SQL injection vulnerability in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trioniclabs:sentinel:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://osvdb.org/77779 - () http://osvdb.org/77779 -
References () http://plugins.trac.wordpress.org/changeset?reponame=&new=475315%40wordpress-sentinel&old=474998%40wordpress-sentinel - () http://plugins.trac.wordpress.org/changeset?reponame=&new=475315%40wordpress-sentinel&old=474998%40wordpress-sentinel -
References () http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/ - Patch () http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/ - Patch
References () http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html - () http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html -
References () http://www.securityfocus.com/bid/51089 - () http://www.securityfocus.com/bid/51089 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/71858 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/71858 -

07 Nov 2023, 02:09

Type Values Removed Values Added
References
  • {'url': 'http://plugins.trac.wordpress.org/changeset?reponame=&new=475315@wordpress-sentinel&old=474998@wordpress-sentinel', 'name': 'http://plugins.trac.wordpress.org/changeset?reponame=&new=475315@wordpress-sentinel&old=474998@wordpress-sentinel', 'tags': ['Exploit', 'Patch'], 'refsource': 'CONFIRM'}
  • () http://plugins.trac.wordpress.org/changeset?reponame=&new=475315%40wordpress-sentinel&old=474998%40wordpress-sentinel -

Information

Published : 2012-10-25 17:55

Updated : 2024-11-21 01:33


NVD link : CVE-2011-5224

Mitre link : CVE-2011-5224

CVE.ORG link : CVE-2011-5224


JSON object : View

Products Affected

wordpress

  • wordpress

trioniclabs

  • sentinel
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')