Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.36.46.56.66.76.82023202420252026

Недавние уязвимости WordPress

Количество 1 896

fstec логотип

BDU:2021-03586

больше 4 лет назад

Уязвимость плагина Kaswara Modern VC Addons системы управления содержимым сайта WordPress, связанная с неограниченной загрузкой файлов опасного типа, позволяющая нарушителю загрузить и выполнить произвольные файлы

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2021-03585

больше 4 лет назад

Уязвимость плагина Business Directory системы управления содержимым сайта WordPress, связанная с неограниченной загрузкой файлов опасного типа, позволяющая нарушителю читать произвольные файлы в каталоге конфигурации

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-m298-fh5c-jc66

больше 4 лет назад

Object injection in PHPMailer/PHPMailer

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2020-36326

больше 4 лет назад

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2020-36326

больше 4 лет назад

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Des ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2020-36326

больше 4 лет назад

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2021-29450

больше 4 лет назад

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2021-29450

больше 4 лет назад

Wordpress is an open source CMS. One of the blocks in the WordPress ed ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2021-29450

больше 4 лет назад

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2021-29447

больше 4 лет назад

Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.

CVSS3: 7.1
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
fstec логотип
BDU:2021-03586

Уязвимость плагина Kaswara Modern VC Addons системы управления содержимым сайта WordPress, связанная с неограниченной загрузкой файлов опасного типа, позволяющая нарушителю загрузить и выполнить произвольные файлы

CVSS3: 9.8
75%
Высокий
больше 4 лет назад
fstec логотип
BDU:2021-03585

Уязвимость плагина Business Directory системы управления содержимым сайта WordPress, связанная с неограниченной загрузкой файлов опасного типа, позволяющая нарушителю читать произвольные файлы в каталоге конфигурации

CVSS3: 7.2
1%
Низкий
больше 4 лет назад
github логотип
GHSA-m298-fh5c-jc66

Object injection in PHPMailer/PHPMailer

CVSS3: 9.8
1%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-36326

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS3: 9.8
1%
Низкий
больше 4 лет назад
debian логотип
CVE-2020-36326

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Des ...

CVSS3: 9.8
1%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2020-36326

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS3: 9.8
1%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-29450

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

CVSS3: 6.5
2%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-29450

Wordpress is an open source CMS. One of the blocks in the WordPress ed ...

CVSS3: 6.5
2%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2021-29450

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

CVSS3: 6.5
2%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-29447

Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.

CVSS3: 7.1
91%
Критический
больше 4 лет назад

Уязвимостей на страницу


Поделиться