The Register Plus plugin 3.5.1 and earlier for WordPress allows remote attackers to obtain sensitive information via a direct request to (1) dash_widget.php and (2) register-plus.php, which reveals the installation path in an error message.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/files/view/96143/registerplus-xss.txt - Exploit | |
References | () http://websecurity.com.ua/4539 - Exploit | |
References | () http://www.securityfocus.com/archive/1/514903/100/0/threaded - |
Information
Published : 2010-12-06 13:37
Updated : 2024-11-21 01:20
NVD link : CVE-2010-4403
Mitre link : CVE-2010-4403
CVE.ORG link : CVE-2010-4403
JSON object : View
Products Affected
devbits
- register-plus
wordpress
- wordpress
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor