Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"

Количество 1 906

Количество 1 906

ubuntu логотип

CVE-2018-20148

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2018-20148

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2018-20148

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could con ...

CVSS3: 9.8
EPSS: Средний
ubuntu логотип

CVE-2018-20147

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2018-20147

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2018-20147

около 7 лет назад

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify m ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2018-14028

больше 7 лет назад

In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins.

CVSS3: 7.2
EPSS: Низкий
nvd логотип

CVE-2018-14028

больше 7 лет назад

In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins.

CVSS3: 7.2
EPSS: Низкий
debian логотип

CVE-2018-14028

больше 7 лет назад

In WordPress 4.9.7, plugins uploaded via the admin area are not verifi ...

CVSS3: 7.2
EPSS: Низкий
ubuntu логотип

CVE-2018-12895

больше 7 лет назад

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
EPSS: Высокий
nvd логотип

CVE-2018-12895

больше 7 лет назад

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
EPSS: Высокий
debian логотип

CVE-2018-12895

больше 7 лет назад

WordPress through 4.9.6 allows Author users to execute arbitrary code ...

CVSS3: 8.8
EPSS: Высокий
ubuntu логотип

CVE-2018-10102

почти 8 лет назад

Before WordPress 4.9.5, the version string was not escaped in the get_the_generator function, and could lead to XSS in a generator tag.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2018-10102

почти 8 лет назад

Before WordPress 4.9.5, the version string was not escaped in the get_the_generator function, and could lead to XSS in a generator tag.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2018-10102

почти 8 лет назад

Before WordPress 4.9.5, the version string was not escaped in the get_ ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2018-10101

почти 8 лет назад

Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2018-10101

почти 8 лет назад

Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2018-10101

почти 8 лет назад

Before WordPress 4.9.5, the URL validator assumed URLs with the hostna ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2018-10100

почти 8 лет назад

Before WordPress 4.9.5, the redirection URL for the login page was not validated or sanitized if forced to use HTTPS.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2018-10100

почти 8 лет назад

Before WordPress 4.9.5, the redirection URL for the login page was not validated or sanitized if forced to use HTTPS.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-20148

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
55%
Средний
около 7 лет назад
nvd логотип
CVE-2018-20148

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.

CVSS3: 9.8
55%
Средний
около 7 лет назад
debian логотип
CVE-2018-20148

In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could con ...

CVSS3: 9.8
55%
Средний
около 7 лет назад
ubuntu логотип
CVE-2018-20147

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.

CVSS3: 6.5
6%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-20147

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.

CVSS3: 6.5
6%
Низкий
около 7 лет назад
debian логотип
CVE-2018-20147

In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify m ...

CVSS3: 6.5
6%
Низкий
около 7 лет назад
ubuntu логотип
CVE-2018-14028

In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins.

CVSS3: 7.2
2%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-14028

In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins.

CVSS3: 7.2
2%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-14028

In WordPress 4.9.7, plugins uploaded via the admin area are not verifi ...

CVSS3: 7.2
2%
Низкий
больше 7 лет назад
ubuntu логотип
CVE-2018-12895

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
89%
Высокий
больше 7 лет назад
nvd логотип
CVE-2018-12895

WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.

CVSS3: 8.8
89%
Высокий
больше 7 лет назад
debian логотип
CVE-2018-12895

WordPress through 4.9.6 allows Author users to execute arbitrary code ...

CVSS3: 8.8
89%
Высокий
больше 7 лет назад
ubuntu логотип
CVE-2018-10102

Before WordPress 4.9.5, the version string was not escaped in the get_the_generator function, and could lead to XSS in a generator tag.

CVSS3: 6.1
5%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-10102

Before WordPress 4.9.5, the version string was not escaped in the get_the_generator function, and could lead to XSS in a generator tag.

CVSS3: 6.1
5%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-10102

Before WordPress 4.9.5, the version string was not escaped in the get_ ...

CVSS3: 6.1
5%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2018-10101

Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.

CVSS3: 6.1
9%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-10101

Before WordPress 4.9.5, the URL validator assumed URLs with the hostname localhost were on the same host as the WordPress server.

CVSS3: 6.1
9%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-10101

Before WordPress 4.9.5, the URL validator assumed URLs with the hostna ...

CVSS3: 6.1
9%
Низкий
почти 8 лет назад
ubuntu логотип
CVE-2018-10100

Before WordPress 4.9.5, the redirection URL for the login page was not validated or sanitized if forced to use HTTPS.

CVSS3: 6.1
7%
Низкий
почти 8 лет назад
nvd логотип
CVE-2018-10100

Before WordPress 4.9.5, the redirection URL for the login page was not validated or sanitized if forced to use HTTPS.

CVSS3: 6.1
7%
Низкий
почти 8 лет назад

Уязвимостей на страницу