cvelist/2023/0xxx/CVE-2023-0600.json

80 lines
2.4 KiB
JSON
Raw Normal View History

2023-01-31 20:00:38 +00:00
{
2023-05-15 13:00:39 +00:00
"data_version": "4.0",
2023-01-31 20:00:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0600",
2023-05-15 13:00:39 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2023-01-31 20:00:38 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-05-15 13:00:39 +00:00
"value": "The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 6.9 does not escape user input which is concatenated to an SQL query, allowing unauthenticated visitors to conduct SQL Injection attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WP Visitor Statistics (Real Time Traffic)",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "6.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/8f46df4d-cb80-4d66-846f-85faf2ea0ec4",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/8f46df4d-cb80-4d66-846f-85faf2ea0ec4"
2023-01-31 20:00:38 +00:00
}
]
2023-05-15 13:00:39 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Tr\u1ea7n Qu\u1ed1c Tr\u01b0\u1eddng An"
},
{
"lang": "en",
"value": "WPScan"
}
]
2023-01-31 20:00:38 +00:00
}