漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
AJ-Fork 167 allows remote attackers to gain sensitive information via a direct request to (1) auto-acronyms.php, (2) auto-archive.php, (3) ount-article-views.php, (4) kses.php, (5) custom-quick-tags.php, (6) disable-all-comments.php, (7) easy-date-format.php, (8) enable-disable-comments.php, (9) filter-by-author.php, (10) format-switcher.php, (11) long-to-short.php, (12) prospective-posting.php, or (13) sort-by-xfield.php, which displays the full path in an error message.
漏洞信息
N/A
漏洞
N/A
漏洞
AJ-Fork显示的错误信息的完整路径漏洞
漏洞信息
AJ-Fork 167版本存在漏洞。远程攻击者借助(1)auto-acronyms.php,(2)auto-archive.php,(3)ount-article-views.php,(4)kses.php,(5)custom-quick-tags.php,(6)disable-all-comments.php,(7)easy-date-format.php,(8)enable-disable-comments.php,(9)filter-by-author.php,(10)format-switcher
漏洞信息
N/A
漏洞
N/A