Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v3r5-4wmw-ccc3

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

EPSS

Процентиль: 79%
0.01329
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

nvd
почти 19 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

debian
почти 19 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote att ...

EPSS

Процентиль: 79%
0.01329
Низкий