Логотип exploitDog
bind:CVE-2016-4029
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-4029

Количество 4

Количество 4

ubuntu логотип

CVE-2016-4029

около 9 лет назад

WordPress before 4.5 does not consider octal and hexadecimal IP address formats when determining an intranet address, which allows remote attackers to bypass an intended SSRF protection mechanism via a crafted address.

CVSS3: 8.6
EPSS: Низкий
nvd логотип

CVE-2016-4029

около 9 лет назад

WordPress before 4.5 does not consider octal and hexadecimal IP address formats when determining an intranet address, which allows remote attackers to bypass an intended SSRF protection mechanism via a crafted address.

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2016-4029

около 9 лет назад

WordPress before 4.5 does not consider octal and hexadecimal IP addres ...

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-j2rp-vprg-5m9q

около 3 лет назад

WordPress before 4.5 does not consider octal and hexadecimal IP address formats when determining an intranet address, which allows remote attackers to bypass an intended SSRF protection mechanism via a crafted address.

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-4029

WordPress before 4.5 does not consider octal and hexadecimal IP address formats when determining an intranet address, which allows remote attackers to bypass an intended SSRF protection mechanism via a crafted address.

CVSS3: 8.6
0%
Низкий
около 9 лет назад
nvd логотип
CVE-2016-4029

WordPress before 4.5 does not consider octal and hexadecimal IP address formats when determining an intranet address, which allows remote attackers to bypass an intended SSRF protection mechanism via a crafted address.

CVSS3: 8.6
0%
Низкий
около 9 лет назад
debian логотип
CVE-2016-4029

WordPress before 4.5 does not consider octal and hexadecimal IP addres ...

CVSS3: 8.6
0%
Низкий
около 9 лет назад
github логотип
GHSA-j2rp-vprg-5m9q

WordPress before 4.5 does not consider octal and hexadecimal IP address formats when determining an intranet address, which allows remote attackers to bypass an intended SSRF protection mechanism via a crafted address.

CVSS3: 8.6
0%
Низкий
около 3 лет назад

Уязвимостей на страницу