Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-23f8-73vw-v59q

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

WordPress 2.0.6, and 2.1Alpha 3 (SVN:4662), does not properly verify that the m parameter value has the string data type, which allows remote attackers to obtain sensitive information via an invalid m[] parameter, as demonstrated by obtaining the path, and obtaining certain SQL information such as the table prefix.

WordPress 2.0.6, and 2.1Alpha 3 (SVN:4662), does not properly verify that the m parameter value has the string data type, which allows remote attackers to obtain sensitive information via an invalid m[] parameter, as demonstrated by obtaining the path, and obtaining certain SQL information such as the table prefix.

EPSS

Процентиль: 70%
0.00654
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

WordPress 2.0.6, and 2.1Alpha 3 (SVN:4662), does not properly verify that the m parameter value has the string data type, which allows remote attackers to obtain sensitive information via an invalid m[] parameter, as demonstrated by obtaining the path, and obtaining certain SQL information such as the table prefix.

nvd
больше 18 лет назад

WordPress 2.0.6, and 2.1Alpha 3 (SVN:4662), does not properly verify that the m parameter value has the string data type, which allows remote attackers to obtain sensitive information via an invalid m[] parameter, as demonstrated by obtaining the path, and obtaining certain SQL information such as the table prefix.

debian
больше 18 лет назад

WordPress 2.0.6, and 2.1Alpha 3 (SVN:4662), does not properly verify t ...

EPSS

Процентиль: 70%
0.00654
Низкий