Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-0539

Опубликовано: 29 янв. 2007
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 7.8

Описание

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

edgy

ignored

end of life, was needed
feisty

not-affected

gutsy

not-affected

hardy

not-affected

intrepid

not-affected

jaunty

not-affected

karmic

not-affected

upstream

released

2.0.8

Показывать по

Ссылки на источники

EPSS

Процентиль: 78%
0.01165
Низкий

7.8 High

CVSS2

Связанные уязвимости

nvd
больше 18 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

debian
больше 18 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote att ...

github
около 3 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

EPSS

Процентиль: 78%
0.01165
Низкий

7.8 High

CVSS2