CVE-2015-20120

Next Click Ventures RealtyScript 4.0.2 contains multiple time-based blind SQL injection vulnerabilities that allow unauthenticated attackers to extract database information by injecting SQL code into application parameters. Attackers can craft requests with time-delay payloads to infer database contents character by character based on response timing differences.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextclickventures:realtyscript:4.0.2:*:*:*:*:*:*:*

History

19 Mar 2026, 14:15

Type Values Removed Values Added
First Time Nextclickventures realtyscript
Nextclickventures
CPE cpe:2.3:a:nextclickventures:realtyscript:4.0.2:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/38497 - () https://www.exploit-db.com/exploits/38497 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/realtyscript-multiple-time-based-blind-sql-injection - () https://www.vulncheck.com/advisories/realtyscript-multiple-time-based-blind-sql-injection - Third Party Advisory
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5270.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5270.php - Exploit, Third Party Advisory
Summary
  • (es) Next Click Ventures RealtyScript 4.0.2 contiene múltiples vulnerabilidades de inyección SQL ciega basada en tiempo que permiten a atacantes no autenticados extraer información de la base de datos inyectando código SQL en los parámetros de la aplicación. Los atacantes pueden elaborar solicitudes con cargas útiles de retardo de tiempo para inferir el contenido de la base de datos carácter por carácter basándose en las diferencias de tiempo de respuesta.

16 Mar 2026, 14:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-16 14:17

Updated : 2026-03-19 14:15


NVD link : CVE-2015-20120

Mitre link : CVE-2015-20120

CVE.ORG link : CVE-2015-20120


JSON object : View

Products Affected

nextclickventures

  • realtyscript
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')