Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-5715

Опубликовано: 22 мая 2016
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 4
CVSS3: 4.3

Описание

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

4.3.1+dfsg-1
cosmic

not-affected

4.3.1+dfsg-1
devel

not-affected

4.3.1+dfsg-1
disco

not-affected

4.3.1+dfsg-1
esm-apps/bionic

not-affected

4.3.1+dfsg-1
esm-apps/xenial

not-affected

4.3.1+dfsg-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage

Показывать по

EPSS

Процентиль: 97%
0.34443
Средний

4 Medium

CVSS2

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
около 9 лет назад

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.

CVSS3: 4.3
debian
около 9 лет назад

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in ...

CVSS3: 4.3
github
около 3 лет назад

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.

EPSS

Процентиль: 97%
0.34443
Средний

4 Medium

CVSS2

4.3 Medium

CVSS3