漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
wp-trackback.php in WordPress 2.0.6 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary SQL commands via the tb_id parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in WordPress.
漏洞信息
N/A
漏洞
N/A
漏洞
WordPress 'Wp-trackback.PHP' SQL注入漏洞
漏洞信息
当输入数据包含一个数字参数时,WordPress 2.0.6及之前版本中的wp-trackback.php没有正确的打乱变量,这使得远程攻击者可以借助tb_id参数,执行任意的SQL指令。
漏洞信息
N/A
漏洞
N/A