TechyTalk Quick Chat WordPress Plugin All up to the latest is affected by: SQL Injection. The impact is: Access to the database. The component is: like_escape is used in Quick-chat.php line 399. The attack vector is: Crafted ajax request.
References
Link | Resource |
---|---|
https://metalamin.github.io/Quick-Chat-SQLi-EN/ | Not Applicable Third Party Advisory |
https://metalamin.github.io/Quick-Chat-SQLi-EN/ | Not Applicable Third Party Advisory |
Configurations
History
21 Nov 2024, 04:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://metalamin.github.io/Quick-Chat-SQLi-EN/ - Not Applicable, Third Party Advisory |
Information
Published : 2019-07-18 16:15
Updated : 2024-11-21 04:17
NVD link : CVE-2019-1010104
Mitre link : CVE-2019-1010104
CVE.ORG link : CVE-2019-1010104
JSON object : View
Products Affected
techytalk
- quick_chat
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')