CVE-2020-5766

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SRS Simple Hits Counter Plugin for WordPress 1.0.3 and 1.0.4 allows a remote, unauthenticated attacker to determine the value of database fields.
References
Link Resource
https://www.tenable.com/security/research/tra-2020-42 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2020-42 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:srs_simple_hits_counter_project:srs_simple_hits_counter:1.0.3:*:*:*:*:wordpress:*:*
cpe:2.3:a:srs_simple_hits_counter_project:srs_simple_hits_counter:1.0.4:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:34

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2020-42 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2020-42 - Exploit, Third Party Advisory

Information

Published : 2020-07-13 15:15

Updated : 2024-11-21 05:34


NVD link : CVE-2020-5766

Mitre link : CVE-2020-5766

CVE.ORG link : CVE-2020-5766


JSON object : View

Products Affected

srs_simple_hits_counter_project

  • srs_simple_hits_counter
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')