Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-2432

Опубликовано: 10 июл. 2009
Источник: debian
EPSS Низкий

Описание

WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed2.8.3-1package

Примечания

  • Installation path is a known fact on a Debian package installation

EPSS

Процентиль: 77%
0.01072
Низкий

Связанные уязвимости

ubuntu
почти 16 лет назад

WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message.

redhat
почти 16 лет назад

WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message.

nvd
почти 16 лет назад

WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message.

github
около 3 лет назад

WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message.

EPSS

Процентиль: 77%
0.01072
Низкий