Описание
WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source.
WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-2431
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51733
- http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_Unchecked
- http://securitytracker.com/id?1022528
- http://www.osvdb.org/55716
- http://www.securityfocus.com/archive/1/504795/100/0/threaded
- http://www.vupen.com/english/advisories/2009/1833
Связанные уязвимости
WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source.
WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source.
WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source.
WordPress 2.7.1 places the username of a post's author in an HTML comm ...