Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.46.56.66.76.86.920232024202520262027

Недавние уязвимости WordPress

Количество 1 906

nvd логотип

CVE-2018-20148

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2018-20148

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could con ...

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2018-20147

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2018-20147

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify m ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2018-20147

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2018-20151

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2018-20148

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
EPSS: Средний
ubuntu логотип

CVE-2018-20152

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input.

CVSS3: 6.5
EPSS: Средний
ubuntu логотип

CVE-2018-20149

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data.

CVSS3: 5.4
EPSS: Низкий
ubuntu логотип

CVE-2018-20153

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could modify new comments made by users with greater privileges, possibly causing XSS.

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2018-20148

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
55%
Средний
около 7 лет назад
debian логотип
CVE-2018-20148

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could con ...

CVSS3: 9.8
55%
Средний
около 7 лет назад
nvd логотип
CVE-2018-20147

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.

CVSS3: 6.5
6%
Низкий
около 7 лет назад
debian логотип
CVE-2018-20147

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify m ...

CVSS3: 6.5
6%
Низкий
около 7 лет назад
ubuntu логотип
CVE-2018-20147

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.

CVSS3: 6.5
6%
Низкий
около 7 лет назад
ubuntu логотип
CVE-2018-20151

In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.

CVSS3: 7.5
7%
Низкий
около 7 лет назад
ubuntu логотип
CVE-2018-20148

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
55%
Средний
около 7 лет назад
ubuntu логотип
CVE-2018-20152

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input.

CVSS3: 6.5
12%
Средний
около 7 лет назад
ubuntu логотип
CVE-2018-20149

In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data.

CVSS3: 5.4
4%
Низкий
около 7 лет назад
ubuntu логотип
CVE-2018-20153

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could modify new comments made by users with greater privileges, possibly causing XSS.

CVSS3: 5.4
5%
Низкий
около 7 лет назад

Уязвимостей на страницу


Поделиться