You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The vulnerability should be remotely exploitable without authentication and user interaction. Yes
The detector should provide a reliable false-positive free detection report. Yes
The vulnerability should have a relatively large impact radius. Yes, Woocommerce
Please let me know if this is in scope as I've already made the development.
The text was updated successfully, but these errors were encountered:
Vulnerability details:
Type: Woocommerce SQL Injection
References:
- https://patchstack.com/woocommerce-sql-injection-vulnerability/
- https://www.kroll.com/en/insights/publications/cyber/critical-sql-injection-vulnerability-patched-woocommerce
The vulnerability should be remotely exploitable without authentication and user interaction. Yes
The detector should provide a reliable false-positive free detection report. Yes
The vulnerability should have a relatively large impact radius. Yes, Woocommerce
Please let me know if this is in scope as I've already made the development.
The text was updated successfully, but these errors were encountered: