Language:
https://seclists.org/fulldisclosure/2014/Jun/0
https://wordpress.org/plugins/participants-database/#changelog
Severity: Critical
ID: 76072
File Name: wordpress_participants_database_sql_injection.nasl
Version: 1.12
Type: remote
Family: CGI abuses
Published: 6/16/2014
Updated: 6/4/2024
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: High
Score: 7.3
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Risk Factor: Critical
Base Score: 10
Temporal Score: 9.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/a:wordpress:wordpress, cpe:/a:xnau:participants_databas3
Required KB Items: installed_sw/WordPress, www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: No exploit is required
Exploited by Nessus: true
Patch Publication Date: 5/31/2014
Vulnerability Publication Date: 6/1/2014
CVE: CVE-2014-3961
BID: 67769