{ "schema_version": "1.4.0", "id": "GHSA-79q4-xv4r-946x", "modified": "2022-05-01T18:41:39Z", "published": "2022-05-01T18:41:39Z", "aliases": [ "CVE-2007-6318" ], "details": "SQL injection vulnerability in wp-includes/query.php in WordPress 2.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the s parameter, when DB_CHARSET is set to (1) Big5, (2) GBK, or possibly other character set encodings that support a \"\\\" in a multibyte character.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6318" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38959" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html" }, { "type": "WEB", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-December/058999.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/28005" }, { "type": "WEB", "url": "http://secunia.com/advisories/28310" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/3433" }, { "type": "WEB", "url": "http://www.abelcheung.org/advisory/20071210-wordpress-charset.txt" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/484828/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/26795" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1019071" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/4172" } ], "database_specific": { "cwe_ids": [ "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-12-12T00:46:00Z" } }