10 lines
430 B
Text
Executable file
10 lines
430 B
Text
Executable file
source: http://www.securityfocus.com/bid/28845/info
|
|
|
|
WordPress is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.
|
|
|
|
Exploiting the issue may allow an attacker to access sensitive information that could aid in further attacks.
|
|
|
|
WordPress 2.3.3 is vulnerable; other versions may also be affected.
|
|
|
|
http://www.example.com/wordpress/?cat=1.php/../searchform?
|
|
|