Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-2667

Опубликовано: 30 мая 2006
Источник: ubuntu
Приоритет: untriaged
EPSS Средний
CVSS2: 7.5

Описание

Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

edgy

not-affected

feisty

not-affected

gutsy

not-affected

hardy

not-affected

intrepid

not-affected

jaunty

not-affected

karmic

not-affected

upstream

released

2.0.3

Показывать по

Ссылки на источники

EPSS

Процентиль: 97%
0.32191
Средний

7.5 High

CVSS2

Связанные уязвимости

nvd
около 19 лет назад

Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.

debian
около 19 лет назад

Direct static code injection vulnerability in WordPress 2.0.2 and earl ...

github
около 3 лет назад

Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.

EPSS

Процентиль: 97%
0.32191
Средний

7.5 High

CVSS2