A vulnerability was found in Analytics Stats Counter Statistics Plugin 1.2.2.5 and classified as critical. This issue affects some unknown processing. The manipulation leads to code injection. The attack may be initiated remotely.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Feb/74 | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.97367 | Third Party Advisory |
http://seclists.org/fulldisclosure/2017/Feb/74 | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.97367 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Feb/74 - Exploit, Mailing List, Third Party Advisory | |
References | () https://vuldb.com/?id.97367 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.3 |
Information
Published : 2022-06-27 19:15
Updated : 2024-11-21 03:22
NVD link : CVE-2017-20099
Mitre link : CVE-2017-20099
CVE.ORG link : CVE-2017-20099
JSON object : View
Products Affected
analytics_stats_counter_statistics_project
- analytics_stats_counter_statistics
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')