Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v3r5-4wmw-ccc3

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

EPSS

Процентиль: 78%
0.01165
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

nvd
больше 18 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

debian
больше 18 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote att ...

EPSS

Процентиль: 78%
0.01165
Низкий