Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jmq8-c9qv-c8x5

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

** DISPUTED ** Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use.

** DISPUTED ** Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use.

EPSS

Процентиль: 69%
0.00601
Низкий

Связанные уязвимости

nvd
около 19 лет назад

Directory traversal vulnerability in WBmap.php in WikyBlog 1.3.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter. NOTE: CVE disputes this vulnerability because l is validated by ctype_alpha before use

EPSS

Процентиль: 69%
0.00601
Низкий