Summary
Detail | |||
---|---|---|---|
Vendor | Wowonder | First view | 2021-03-18 |
Product | Wowonder | Last view | 2022-11-15 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2022-11-15 | CVE-2022-42984 | WoWonder Social Network Platform 4.1.4 was discovered to contain a SQL injection vulnerability via the offset parameter at requests.php?f=search&s=recipients. |
7.5 | 2022-11-15 | CVE-2022-40405 | WoWonder Social Network Platform v4.1.2 was discovered to contain a SQL injection vulnerability via the offset parameter at requests.php?f=load-my-blogs. |
4.3 | 2022-05-17 | CVE-2022-1753 | A vulnerability, which was classified as critical, was found in WoWonder. Affected is the file /requests.php which is responsible to handle group messages. The manipulation of the argument group_id allows posting messages in other groups. It is possible to launch the attack remotely but it might require authentication. A video explaining the attack has been disclosed to the public. |
5.3 | 2022-03-27 | CVE-2022-26254 | WoWonder The Ultimate PHP Social Network Platform v4.0.0 was discovered to contain an access control issue which allows unauthenticated attackers to arbitrarily change group ID names. |
9.8 | 2021-06-11 | CVE-2021-27200 | In WoWonder 3.0.4, remote attackers can take over any account due to the weak cryptographic algorithm in recover.php. The code parameter is easily predicted from the time of day. |
7.5 | 2021-03-18 | CVE-2021-26935 | In WoWonder < 3.1, remote attackers can gain access to the database by exploiting a requests.php?f=search-my-followers SQL Injection vulnerability via the event_id parameter. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
60% (3) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
20% (1) | CWE-639 | Access Control Bypass Through User-Controlled Key |
20% (1) | CWE-330 | Use of Insufficiently Random Values |