Vulnerabilites related to trioniclabs - sentinel
Vulnerability from fkie_nvd
Published
2012-10-25 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to hijack the authentication of an administrator for requests that trigger snapshots.
Impacted products
Vendor Product Version
trioniclabs sentinel 1.0.0
wordpress wordpress -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:trioniclabs:sentinel:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4299141-AD00-44C1-B853-2295426B2124",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to hijack the authentication of an administrator for requests that trigger snapshots."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en wordpress_sentinel.php en el plugin Sentinel v1.0.0 para WordPress, permite a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para peticiones que provocan instant\u00e1neas."
    }
  ],
  "id": "CVE-2011-5226",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-10-25T17:55:05.547",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/77778"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47020"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/51089"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/77778"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71857"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-10-25 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
SQL injection vulnerability in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Impacted products
Vendor Product Version
trioniclabs sentinel 1.0.0
wordpress wordpress -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:trioniclabs:sentinel:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4299141-AD00-44C1-B853-2295426B2124",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en Sentinel plugin v1.0.0 para WordPress, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2011-5224",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-10-25T17:55:05.390",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/77779"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/51089"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/77779"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71858"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-10-25 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Impacted products
Vendor Product Version
trioniclabs sentinel 1.0.0
wordpress wordpress -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:trioniclabs:sentinel:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4299141-AD00-44C1-B853-2295426B2124",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en wordpress_sentinel.php en el plugin Sentinel  v1.0.0 para WordPress, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2011-5225",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-10-25T17:55:05.500",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/77777"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47020"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/51089"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/77777"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71854"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2011-5226 (GCVE-0-2011-5226)
Vulnerability from cvelistv5
Published
2012-10-25 17:00
Modified
2024-08-07 00:30
Severity ?
CWE
  • n/a
Summary
Cross-site request forgery (CSRF) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to hijack the authentication of an administrator for requests that trigger snapshots.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:30:47.077Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "51089",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51089"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
          },
          {
            "name": "77778",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/77778"
          },
          {
            "name": "sentinel-unspecified-csrf(71857)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71857"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
          },
          {
            "name": "47020",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47020"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to hijack the authentication of an administrator for requests that trigger snapshots."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "51089",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51089"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
        },
        {
          "name": "77778",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/77778"
        },
        {
          "name": "sentinel-unspecified-csrf(71857)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71857"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
        },
        {
          "name": "47020",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47020"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5226",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to hijack the authentication of an administrator for requests that trigger snapshots."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "51089",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51089"
            },
            {
              "name": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/",
              "refsource": "CONFIRM",
              "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
            },
            {
              "name": "77778",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/77778"
            },
            {
              "name": "sentinel-unspecified-csrf(71857)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71857"
            },
            {
              "name": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html",
              "refsource": "MISC",
              "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
            },
            {
              "name": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315@wordpress-sentinel\u0026old=474998@wordpress-sentinel",
              "refsource": "CONFIRM",
              "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315@wordpress-sentinel\u0026old=474998@wordpress-sentinel"
            },
            {
              "name": "47020",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/47020"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5226",
    "datePublished": "2012-10-25T17:00:00",
    "dateReserved": "2012-10-25T00:00:00",
    "dateUpdated": "2024-08-07T00:30:47.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5224 (GCVE-0-2011-5224)
Vulnerability from cvelistv5
Published
2012-10-25 17:00
Modified
2024-08-07 00:30
Severity ?
CWE
  • n/a
Summary
SQL injection vulnerability in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:30:46.849Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "sentinel-unspecified-sql-injection(71858)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71858"
          },
          {
            "name": "51089",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51089"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
          },
          {
            "name": "77779",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/77779"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "sentinel-unspecified-sql-injection(71858)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71858"
        },
        {
          "name": "51089",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51089"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
        },
        {
          "name": "77779",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/77779"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5224",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to execute arbitrary SQL commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "sentinel-unspecified-sql-injection(71858)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71858"
            },
            {
              "name": "51089",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51089"
            },
            {
              "name": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/",
              "refsource": "CONFIRM",
              "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
            },
            {
              "name": "77779",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/77779"
            },
            {
              "name": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html",
              "refsource": "MISC",
              "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
            },
            {
              "name": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315@wordpress-sentinel\u0026old=474998@wordpress-sentinel",
              "refsource": "CONFIRM",
              "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315@wordpress-sentinel\u0026old=474998@wordpress-sentinel"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5224",
    "datePublished": "2012-10-25T17:00:00",
    "dateReserved": "2012-10-25T00:00:00",
    "dateUpdated": "2024-08-07T00:30:46.849Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5225 (GCVE-0-2011-5225)
Vulnerability from cvelistv5
Published
2012-10-25 17:00
Modified
2024-08-07 00:30
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:30:47.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "51089",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51089"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
          },
          {
            "name": "sentinel-unspecified-xss(71854)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71854"
          },
          {
            "name": "77777",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/77777"
          },
          {
            "name": "47020",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47020"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "51089",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51089"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315%40wordpress-sentinel\u0026old=474998%40wordpress-sentinel"
        },
        {
          "name": "sentinel-unspecified-xss(71854)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71854"
        },
        {
          "name": "77777",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/77777"
        },
        {
          "name": "47020",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47020"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5225",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "51089",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51089"
            },
            {
              "name": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/",
              "refsource": "CONFIRM",
              "url": "http://wordpress.org/extend/plugins/wordpress-sentinel/changelog/"
            },
            {
              "name": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html",
              "refsource": "MISC",
              "url": "http://www.boiteaweb.fr/wordpress-sentinel-v1-0-0-3104.html"
            },
            {
              "name": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315@wordpress-sentinel\u0026old=474998@wordpress-sentinel",
              "refsource": "CONFIRM",
              "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=475315@wordpress-sentinel\u0026old=474998@wordpress-sentinel"
            },
            {
              "name": "sentinel-unspecified-xss(71854)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71854"
            },
            {
              "name": "77777",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/77777"
            },
            {
              "name": "47020",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/47020"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5225",
    "datePublished": "2012-10-25T17:00:00",
    "dateReserved": "2012-10-25T00:00:00",
    "dateUpdated": "2024-08-07T00:30:47.107Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}