Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"

Количество 1 894

Количество 1 894

github логотип

GHSA-vfm4-3xm4-c9rr

около 3 лет назад

WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 does not prevent rendering for (1) admin or (2) login pages inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.

EPSS: Низкий
github логотип

GHSA-vc9p-pxc7-xfc8

около 3 лет назад

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.

CVSS3: 4.3
EPSS: Средний
github логотип

GHSA-vc63-3jgp-qx5q

около 3 лет назад

WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 allows remote attackers to determine usernames of non-authors via canonical redirects.

EPSS: Низкий
github логотип

GHSA-vc3p-78qc-h4m8

около 3 лет назад

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-v9xf-gqqg-xhgx

около 3 лет назад

Cross-site scripting (XSS) vulnerability in blogroll.php in the cordobo-green-park theme for WordPress allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF portion of a URI.

EPSS: Низкий
github логотип

GHSA-v9p6-jxgm-w55j

около 3 лет назад

The create_post function in wp-includes/class-wp-atom-server.php in WordPress before 3.4.2 does not perform a capability check, which allows remote authenticated users to bypass intended access restrictions and publish new posts by leveraging the Contributor role and using the Atom Publishing Protocol (aka AtomPub) feature.

EPSS: Низкий
github логотип

GHSA-v8xm-phm4-7xwm

около 3 лет назад

WordPress 2.9.2 and 3.0.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by wp-admin/includes/user.php and certain other files.

EPSS: Низкий
github логотип

GHSA-v8xj-g4jr-hwhf

около 3 лет назад

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-v744-f96h-39q4

около 3 лет назад

xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users with the contributor role to bypass intended access restrictions and invoke the publish_posts functionality, which can be used to "publish a previously saved post."

EPSS: Низкий
github логотип

GHSA-v5hr-6h2c-gx45

около 3 лет назад

WordPress before 5.2.3 allows XSS in stored comments.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-v5g5-w9j9-7c3g

около 3 лет назад

Cross-site scripting (XSS) vulnerability in wp-admin/edit-post-rows.php in WordPress 2.3 allows remote attackers to inject arbitrary web script or HTML via the posts_columns array parameter.

EPSS: Низкий
github логотип

GHSA-v556-6q84-9x6w

около 3 лет назад

The file upload functionality in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2, when running "on hosts with dangerous security settings," has unknown impact and attack vectors, possibly related to dangerous filenames.

EPSS: Низкий
github логотип

GHSA-v4p8-jvp4-22m6

около 3 лет назад

The default configuration of WordPress before 3.6.1 does not prevent uploads of .swf and .exe files, which might make it easier for remote authenticated users to conduct cross-site scripting (XSS) attacks via a crafted file, related to the get_allowed_mime_types function in wp-includes/functions.php.

EPSS: Низкий
github логотип

GHSA-v4ff-vj6q-v2w9

около 3 лет назад

Cross-site scripting (XSS) vulnerability in WordPress before 2.6, SVN development versions only, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

EPSS: Низкий
github логотип

GHSA-v43p-v75m-q643

около 3 лет назад

SQL injection vulnerability in wp-admin/admin-ajax.php in WordPress before 2.2 allows remote attackers to execute arbitrary SQL commands via the cookie parameter.

EPSS: Низкий
github логотип

GHSA-v3r5-4wmw-ccc3

около 3 лет назад

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

EPSS: Низкий
github логотип

GHSA-v3h4-mqmp-768j

около 3 лет назад

WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-rxch-vxwr-47jw

около 3 лет назад

Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896.

CVSS3: 6.5
EPSS: Средний
github логотип

GHSA-rwhm-6hw4-9fgg

около 3 лет назад

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

CVSS3: 8.8
EPSS: Критический
github логотип

GHSA-rvwm-8qg8-4hp8

больше 2 лет назад

Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script .

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-vfm4-3xm4-c9rr

WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 does not prevent rendering for (1) admin or (2) login pages inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.

0%
Низкий
около 3 лет назад
github логотип
GHSA-vc9p-pxc7-xfc8

The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors.

CVSS3: 4.3
34%
Средний
около 3 лет назад
github логотип
GHSA-vc63-3jgp-qx5q

WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 allows remote attackers to determine usernames of non-authors via canonical redirects.

1%
Низкий
около 3 лет назад
github логотип
GHSA-vc3p-78qc-h4m8

Wordpress 1.5 and earlier allows remote attackers to obtain sensitive information via a direct request to files in (1) wp-content/themes/, (2) wp-includes/, or (3) wp-admin/, which reveal the path in an error message.

CVSS3: 5.3
1%
Низкий
около 3 лет назад
github логотип
GHSA-v9xf-gqqg-xhgx

Cross-site scripting (XSS) vulnerability in blogroll.php in the cordobo-green-park theme for WordPress allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF portion of a URI.

0%
Низкий
около 3 лет назад
github логотип
GHSA-v9p6-jxgm-w55j

The create_post function in wp-includes/class-wp-atom-server.php in WordPress before 3.4.2 does not perform a capability check, which allows remote authenticated users to bypass intended access restrictions and publish new posts by leveraging the Contributor role and using the Atom Publishing Protocol (aka AtomPub) feature.

0%
Низкий
около 3 лет назад
github логотип
GHSA-v8xm-phm4-7xwm

WordPress 2.9.2 and 3.0.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by wp-admin/includes/user.php and certain other files.

1%
Низкий
около 3 лет назад
github логотип
GHSA-v8xj-g4jr-hwhf

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
41%
Средний
около 3 лет назад
github логотип
GHSA-v744-f96h-39q4

xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users with the contributor role to bypass intended access restrictions and invoke the publish_posts functionality, which can be used to "publish a previously saved post."

0%
Низкий
около 3 лет назад
github логотип
GHSA-v5hr-6h2c-gx45

WordPress before 5.2.3 allows XSS in stored comments.

CVSS3: 6.1
2%
Низкий
около 3 лет назад
github логотип
GHSA-v5g5-w9j9-7c3g

Cross-site scripting (XSS) vulnerability in wp-admin/edit-post-rows.php in WordPress 2.3 allows remote attackers to inject arbitrary web script or HTML via the posts_columns array parameter.

4%
Низкий
около 3 лет назад
github логотип
GHSA-v556-6q84-9x6w

The file upload functionality in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2, when running "on hosts with dangerous security settings," has unknown impact and attack vectors, possibly related to dangerous filenames.

1%
Низкий
около 3 лет назад
github логотип
GHSA-v4p8-jvp4-22m6

The default configuration of WordPress before 3.6.1 does not prevent uploads of .swf and .exe files, which might make it easier for remote authenticated users to conduct cross-site scripting (XSS) attacks via a crafted file, related to the get_allowed_mime_types function in wp-includes/functions.php.

0%
Низкий
около 3 лет назад
github логотип
GHSA-v4ff-vj6q-v2w9

Cross-site scripting (XSS) vulnerability in WordPress before 2.6, SVN development versions only, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

0%
Низкий
около 3 лет назад
github логотип
GHSA-v43p-v75m-q643

SQL injection vulnerability in wp-admin/admin-ajax.php in WordPress before 2.2 allows remote attackers to execute arbitrary SQL commands via the cookie parameter.

5%
Низкий
около 3 лет назад
github логотип
GHSA-v3r5-4wmw-ccc3

The wp_remote_fopen function in WordPress before 2.1 allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a large file, which triggers a long download session without a timeout constraint.

1%
Низкий
около 3 лет назад
github логотип
GHSA-v3h4-mqmp-768j

WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.

CVSS3: 5.4
3%
Низкий
около 3 лет назад
github логотип
GHSA-rxch-vxwr-47jw

Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896.

CVSS3: 6.5
30%
Средний
около 3 лет назад
github логотип
GHSA-rwhm-6hw4-9fgg

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

CVSS3: 8.8
91%
Критический
около 3 лет назад
github логотип
GHSA-rvwm-8qg8-4hp8

Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script .

CVSS3: 6.1
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу