Логотип exploitDog
bind:CVE-2024-6477
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6477

Количество 2

Количество 2

nvd логотип

CVE-2024-6477

больше 1 года назад

The UsersWP WordPress plugin before 1.2.12 uses predictable filenames when an admin generates an export, which could allow unauthenticated attackers to download them and retrieve sensitive information such as IP, username, and email address

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-jrj5-pj64-4f42

больше 1 года назад

The UsersWP WordPress plugin before 1.2.12 uses predictable filenames when an admin generates an export, which could allow unauthenticated attackers to download them and retrieve sensitive information such as IP, username, and email address

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-6477

The UsersWP WordPress plugin before 1.2.12 uses predictable filenames when an admin generates an export, which could allow unauthenticated attackers to download them and retrieve sensitive information such as IP, username, and email address

CVSS3: 7.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-jrj5-pj64-4f42

The UsersWP WordPress plugin before 1.2.12 uses predictable filenames when an admin generates an export, which could allow unauthenticated attackers to download them and retrieve sensitive information such as IP, username, and email address

CVSS3: 7.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу