Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vppg-qjgp-vj8p

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

w-agora 4.2.1 allows remote attackers to obtain sensitive information by via the (1) bn[] array parameter to index.php, which expects a string, and (2) certain parameters to delete_forum.php, which displays the path name in the resulting error message.

w-agora 4.2.1 allows remote attackers to obtain sensitive information by via the (1) bn[] array parameter to index.php, which expects a string, and (2) certain parameters to delete_forum.php, which displays the path name in the resulting error message.

EPSS

Процентиль: 68%
0.00574
Низкий

Связанные уязвимости

nvd
почти 19 лет назад

w-agora 4.2.1 allows remote attackers to obtain sensitive information by via the (1) bn[] array parameter to index.php, which expects a string, and (2) certain parameters to delete_forum.php, which displays the path name in the resulting error message.

EPSS

Процентиль: 68%
0.00574
Низкий