Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p47w-r74f-f3j5

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possibly due to uninitialized variables.

WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possibly due to uninitialized variables.

EPSS

Процентиль: 79%
0.01309
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possibly due to uninitialized variables.

nvd
почти 19 лет назад

WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possibly due to uninitialized variables.

debian
почти 19 лет назад

WordPress 2.0.3 allows remote attackers to obtain the installation pat ...

EPSS

Процентиль: 79%
0.01309
Низкий