Wordpress <= 4.6.1 使用语言文件任意代码执行 漏洞分析 - 知道创宇
Tags
Common Information
Type | Value |
---|---|
UUID | e46d5c5a-fddf-4ffb-a05e-5fbde0b8ac69 |
Fingerprint | 7d4b97982a39384 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Oct. 13, 2016, midnight |
Added to db | Jan. 18, 2023, 7:34 p.m. |
Last updated | Nov. 18, 2024, 2:36 a.m. |
Headline | WordPress <= 4.6.1 使用语言文件任意代码执行 漏洞分析 |
Title | Wordpress <= 4.6.1 使用语言文件任意代码执行 漏洞分析 - 知道创宇 |
Detected Hints/Tags/Attributes | 0/0/11 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | http://blog.knownsec.com/2016/10/wordpress-4-6-1-language-exploit/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 221 | gist.github.com |
|
Details | Domain | 132 | www.exploit-db.com |
|
Details | Domain | 8 | bugs.php.net |
|
Details | Domain | 2 | www.2cto.com |
|
Details | Domain | 6 | www.seebug.org |
|
Details | Domain | 24 | php.net |
|
Details | Domain | 3 | codex.wordpress.org |
|
Details | File | 8 | bugs.php |
|
Details | File | 7 | bug.php |
|
Details | File | 1 | 177146.html |
|
Details | File | 1 | translations.php |