Логотип exploitDog
bind:CVE-2005-1688
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-1688

Количество 4

Количество 4

ubuntu логотип

CVE-2005-1688

около 20 лет назад

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2005-1688

около 20 лет назад

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2005-1688

около 20 лет назад

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-vc3p-78qc-h4m8

около 3 лет назад

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2005-1688

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.

CVSS3: 5.3
1%
Низкий
около 20 лет назад
nvd логотип
CVE-2005-1688

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.

CVSS3: 5.3
1%
Низкий
около 20 лет назад
debian логотип
CVE-2005-1688

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive ...

CVSS3: 5.3
1%
Низкий
около 20 лет назад
github логотип
GHSA-vc3p-78qc-h4m8

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.

CVSS3: 5.3
1%
Низкий
около 3 лет назад

Уязвимостей на страницу