This CPE summary could be partial or incomplete. Please contact us for a detailed listing.
Summary
Detail | |||
---|---|---|---|
Vendor | Mapsvg | First view | 2022-05-09 |
Product | Mapsvg | Last view | 2022-05-09 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:mapsvg:mapsvg:*:*:*:*:*:wordpress:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2022-05-09 | CVE-2022-0592 | The MapSVG WordPress plugin before 6.2.20 does not validate and escape a parameter via a REST endpoint before using it in a SQL statement, leading to a SQL Injection exploitable by unauthenticated users. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |