Логотип exploitDog
bind:CVE-2006-1012
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-1012

Количество 4

Количество 4

ubuntu логотип

CVE-2006-1012

больше 19 лет назад

SQL injection vulnerability in WordPress 1.5.2, and possibly other versions before 2.0, allows remote attackers to execute arbitrary SQL commands via the User-Agent field in an HTTP header for a comment.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2006-1012

больше 19 лет назад

SQL injection vulnerability in WordPress 1.5.2, and possibly other versions before 2.0, allows remote attackers to execute arbitrary SQL commands via the User-Agent field in an HTTP header for a comment.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2006-1012

больше 19 лет назад

SQL injection vulnerability in WordPress 1.5.2, and possibly other ver ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-4j36-wmcj-5q44

больше 3 лет назад

SQL injection vulnerability in WordPress 1.5.2, and possibly other versions before 2.0, allows remote attackers to execute arbitrary SQL commands via the User-Agent field in an HTTP header for a comment.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-1012

SQL injection vulnerability in WordPress 1.5.2, and possibly other versions before 2.0, allows remote attackers to execute arbitrary SQL commands via the User-Agent field in an HTTP header for a comment.

CVSS2: 7.5
2%
Низкий
больше 19 лет назад
nvd логотип
CVE-2006-1012

SQL injection vulnerability in WordPress 1.5.2, and possibly other versions before 2.0, allows remote attackers to execute arbitrary SQL commands via the User-Agent field in an HTTP header for a comment.

CVSS2: 7.5
2%
Низкий
больше 19 лет назад
debian логотип
CVE-2006-1012

SQL injection vulnerability in WordPress 1.5.2, and possibly other ver ...

CVSS2: 7.5
2%
Низкий
больше 19 лет назад
github логотип
GHSA-4j36-wmcj-5q44

SQL injection vulnerability in WordPress 1.5.2, and possibly other versions before 2.0, allows remote attackers to execute arbitrary SQL commands via the User-Agent field in an HTTP header for a comment.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу