Логотип exploitDog
bind:CVE-2022-1390
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-1390

Количество 2

Количество 2

nvd логотип

CVE-2022-1390

почти 4 года назад

The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-35fp-65cr-47q7

почти 4 года назад

The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-1390

The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique

CVSS3: 9.8
92%
Критический
почти 4 года назад
github логотип
GHSA-35fp-65cr-47q7

The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique

CVSS3: 9.8
92%
Критический
почти 4 года назад

Уязвимостей на страницу