Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-2221

Опубликовано: 22 мая 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8
CVSS3: 7.4

Описание

Open redirect vulnerability in the wp_validate_redirect function in wp-includes/pluggable.php in WordPress before 4.4.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a malformed URL that triggers incorrect hostname parsing, as demonstrated by an https:example.com URL.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

4.4.2+dfsg-1
cosmic

not-affected

4.4.2+dfsg-1
devel

not-affected

4.4.2+dfsg-1
disco

not-affected

4.4.2+dfsg-1
esm-apps/bionic

not-affected

4.4.2+dfsg-1
esm-apps/xenial

not-affected

4.4.2+dfsg-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
precise

ignored

end of life
precise/esm

DNE

precise was needed

Показывать по

EPSS

Процентиль: 87%
0.03695
Низкий

5.8 Medium

CVSS2

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
nvd
около 9 лет назад

Open redirect vulnerability in the wp_validate_redirect function in wp-includes/pluggable.php in WordPress before 4.4.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a malformed URL that triggers incorrect hostname parsing, as demonstrated by an https:example.com URL.

CVSS3: 7.4
debian
около 9 лет назад

Open redirect vulnerability in the wp_validate_redirect function in wp ...

CVSS3: 7.4
github
около 3 лет назад

Open redirect vulnerability in the wp_validate_redirect function in wp-includes/pluggable.php in WordPress before 4.4.2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a malformed URL that triggers incorrect hostname parsing, as demonstrated by an https:example.com URL.

EPSS

Процентиль: 87%
0.03695
Низкий

5.8 Medium

CVSS2

7.4 High

CVSS3