Логотип exploitDog
bind:CVE-2018-20463
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-20463

Количество 2

Количество 2

nvd логотип

CVE-2018-20463

около 7 лет назад

An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.

CVSS3: 7.5
EPSS: Высокий
github логотип

GHSA-qr25-w2r2-h5v4

больше 3 лет назад

An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.

CVSS3: 7.5
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-20463

An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.

CVSS3: 7.5
76%
Высокий
около 7 лет назад
github логотип
GHSA-qr25-w2r2-h5v4

An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.

CVSS3: 7.5
76%
Высокий
больше 3 лет назад

Уязвимостей на страницу