Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-0664

Опубликовано: 08 фев. 2008
Источник: debian
EPSS Низкий

Описание

The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed2.3.3-1package
wordpressnot-affectedetchpackage
libwordpress-xmlrpc-perlremovedpackage

Примечания

  • The blog has to provide user accounts

  • A crafted XML-RPC request referring to a valid user can exploit this

  • This is specific to wordpress' implementation of xmlrpc.php, which is

  • not included in any other packages.

EPSS

Процентиль: 89%
0.05057
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.

redhat
больше 17 лет назад

The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.

nvd
больше 17 лет назад

The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.

github
больше 3 лет назад

The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.

EPSS

Процентиль: 89%
0.05057
Низкий