mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 21:46:48 +00:00
36 lines
932 B
JSON
36 lines
932 B
JSON
![]() |
{
|
||
|
"id": "CVE-2023-2114",
|
||
|
"sourceIdentifier": "contact@wpscan.com",
|
||
|
"published": "2023-05-08T14:15:13.507",
|
||
|
"lastModified": "2023-05-08T14:17:23.197",
|
||
|
"vulnStatus": "Awaiting Analysis",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "The NEX-Forms WordPress plugin before 8.4 does not properly escape the `table` parameter, which is populated with user input, before concatenating it to an SQL query."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "contact@wpscan.com",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-89"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://github.com/SchmidAlex/nex-forms_SQL-Injection",
|
||
|
"source": "contact@wpscan.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://wpscan.com/vulnerability/3d8ab3a5-1bf8-4216-91fa-e89541e5c43d",
|
||
|
"source": "contact@wpscan.com"
|
||
|
}
|
||
|
]
|
||
|
}
|