Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.36.46.56.66.76.82023202420252026

Недавние уязвимости WordPress

Количество 1 894

github логотип

GHSA-m298-fh5c-jc66

больше 4 лет назад

Object injection in PHPMailer/PHPMailer

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2020-36326

больше 4 лет назад

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2020-36326

больше 4 лет назад

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Des ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2020-36326

больше 4 лет назад

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2021-29450

больше 4 лет назад

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2021-29450

больше 4 лет назад

Wordpress is an open source CMS. One of the blocks in the WordPress ed ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2021-29450

больше 4 лет назад

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2021-29447

больше 4 лет назад

Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.

CVSS3: 7.1
EPSS: Высокий
debian логотип

CVE-2021-29447

больше 4 лет назад

Wordpress is an open source CMS. A user with the ability to upload fil ...

CVSS3: 7.1
EPSS: Высокий
ubuntu логотип

CVE-2021-29447

больше 4 лет назад

Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.

CVSS3: 7.1
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-m298-fh5c-jc66

Object injection in PHPMailer/PHPMailer

CVSS3: 9.8
2%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-36326

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS3: 9.8
2%
Низкий
больше 4 лет назад
debian логотип
CVE-2020-36326

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Des ...

CVSS3: 9.8
2%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2020-36326

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS3: 9.8
2%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-29450

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

CVSS3: 6.5
2%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-29450

Wordpress is an open source CMS. One of the blocks in the WordPress ed ...

CVSS3: 6.5
2%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2021-29450

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

CVSS3: 6.5
2%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-29447

Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.

CVSS3: 7.1
89%
Высокий
больше 4 лет назад
debian логотип
CVE-2021-29447

Wordpress is an open source CMS. A user with the ability to upload fil ...

CVSS3: 7.1
89%
Высокий
больше 4 лет назад
ubuntu логотип
CVE-2021-29447

Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.

CVSS3: 7.1
89%
Высокий
больше 4 лет назад

Уязвимостей на страницу


Поделиться