Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"

Количество 1 894

Количество 1 894

github логотип

GHSA-q2qm-9w2w-5x96

около 3 лет назад

** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier generates different error messages for requests lacking a dbname parameter depending on whether the MySQL credentials are valid, which makes it easier for remote attackers to conduct brute-force attacks via a series of requests with different uname and pwd parameters. NOTE: the vendor disputes the significance of this issue; also, it is unclear whether providing intentionally vague error messages during installation would be reasonable from a usability perspective.

EPSS: Низкий
github логотип

GHSA-pxcx-cprx-mr28

около 3 лет назад

In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.

CVSS3: 7.5
EPSS: Высокий
github логотип

GHSA-pwp5-jmpj-2v4w

около 3 лет назад

Cross-site scripting (XSS) vulnerability in 404.php in the Vistered-Little theme for WordPress allows remote attackers to inject arbitrary web script or HTML via the URI (REQUEST_URI) that accesses index.php. NOTE: this can be leveraged for PHP code execution in an administrative session.

EPSS: Низкий
github логотип

GHSA-pwhv-j4q5-f4g2

около 3 лет назад

** DISPUTED ** Cross-site scripting (XSS) vulnerability in WordPress 2.0.0 allows remote attackers to inject arbitrary web script or HTML via scriptable attributes such as (1) onfocus and (2) onblur in the "author's website" field. NOTE: followup comments to the researcher's web log suggest that this issue is only exploitable by the same user who injects the XSS, so this might not be a vulnerability.

EPSS: Низкий
github логотип

GHSA-pv54-xqw9-86jh

около 3 лет назад

Before WordPress 4.9.5, the version string was not escaped in the get_the_generator function, and could lead to XSS in a generator tag.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-pqh4-x29p-6xrc

около 3 лет назад

wp-mail.php in WordPress before 4.7.1 might allow remote attackers to bypass intended posting restrictions via a spoofed mail server with the mail.example.com name.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-pqc9-8ghg-8vc2

около 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in wp-includes/functions.php in WordPress before 2.1.2-alpha allow remote attackers to inject arbitrary web script or HTML via (1) the Referer HTTP header or (2) the URI, a different vulnerability than CVE-2007-1049.

EPSS: Низкий
github логотип

GHSA-pq6q-6pp2-6x56

около 3 лет назад

WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure.

EPSS: Низкий
github логотип

GHSA-ppxh-5qq2-77g8

около 3 лет назад

WordPress before 5.3.1 allowed an unauthenticated user to make a post sticky through the REST API because of missing access control in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-pp8c-8h35-cghc

около 3 лет назад

SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.

EPSS: Низкий
github логотип

GHSA-pmh6-cq54-943m

больше 2 лет назад

WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-pj8j-hmc8-6q85

около 3 лет назад

Cross-site request forgery (CSRF) vulnerability in the AdminPanel in WordPress 2.1.1 and earlier allows remote attackers to perform privileged actions as administrators, as demonstrated using the delete action in wp-admin/post.php. NOTE: this issue can be leveraged to perform cross-site scripting (XSS) attacks and steal cookies via the post parameter.

EPSS: Низкий
github логотип

GHSA-pj25-83q9-ppf3

около 3 лет назад

Cross-site scripting (XSS) vulnerability in the wp_get_attachment_link function in wp-includes/post-template.php in WordPress before 4.5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name, a different vulnerability than CVE-2016-5833.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-phhp-w7c7-3wcv

около 3 лет назад

Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information.

EPSS: Низкий
github логотип

GHSA-p47w-r74f-f3j5

около 3 лет назад

WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possibly due to uninitialized variables.

EPSS: Низкий
github логотип

GHSA-p45m-x7rq-w3r2

около 3 лет назад

Cross-site scripting (XSS) vulnerability in the theme-name fallback functionality in wp-includes/class-wp-theme.php in WordPress before 4.7.1 allows remote attackers to inject arbitrary web script or HTML via a crafted directory name of a theme, related to wp-admin/includes/class-theme-installer-skin.php.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-p3fq-9wj3-h9c3

около 3 лет назад

wp-admin/user-edit.php in WordPress before 2.0.5 allows remote authenticated users to read the metadata of an arbitrary user via a modified user_id parameter.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-p2ph-58w4-xr4f

около 3 лет назад

WordPress before 3.5.2, when the uploads directory forbids write access, allows remote attackers to obtain sensitive information via an invalid upload request, which reveals the absolute path in an XMLHttpRequest error message.

EPSS: Низкий
github логотип

GHSA-mwxx-w555-5h5m

около 3 лет назад

WordPress before 5.5.2 allows stored XSS via post slugs.

CVSS3: 6.1
EPSS: Средний
github логотип

GHSA-mrjh-wq58-w8wr

около 3 лет назад

Cross-site scripting (XSS) vulnerability in searchform.php in the AndyBlue theme before 20070607 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF portion of a URI to index.php. NOTE: this can be leveraged for PHP code execution in an administrative session.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-q2qm-9w2w-5x96

** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier generates different error messages for requests lacking a dbname parameter depending on whether the MySQL credentials are valid, which makes it easier for remote attackers to conduct brute-force attacks via a series of requests with different uname and pwd parameters. NOTE: the vendor disputes the significance of this issue; also, it is unclear whether providing intentionally vague error messages during installation would be reasonable from a usability perspective.

5%
Низкий
около 3 лет назад
github логотип
GHSA-pxcx-cprx-mr28

In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.

CVSS3: 7.5
90%
Высокий
около 3 лет назад
github логотип
GHSA-pwp5-jmpj-2v4w

Cross-site scripting (XSS) vulnerability in 404.php in the Vistered-Little theme for WordPress allows remote attackers to inject arbitrary web script or HTML via the URI (REQUEST_URI) that accesses index.php. NOTE: this can be leveraged for PHP code execution in an administrative session.

1%
Низкий
около 3 лет назад
github логотип
GHSA-pwhv-j4q5-f4g2

** DISPUTED ** Cross-site scripting (XSS) vulnerability in WordPress 2.0.0 allows remote attackers to inject arbitrary web script or HTML via scriptable attributes such as (1) onfocus and (2) onblur in the "author's website" field. NOTE: followup comments to the researcher's web log suggest that this issue is only exploitable by the same user who injects the XSS, so this might not be a vulnerability.

1%
Низкий
около 3 лет назад
github логотип
GHSA-pv54-xqw9-86jh

Before WordPress 4.9.5, the version string was not escaped in the get_the_generator function, and could lead to XSS in a generator tag.

CVSS3: 6.1
6%
Низкий
около 3 лет назад
github логотип
GHSA-pqh4-x29p-6xrc

wp-mail.php in WordPress before 4.7.1 might allow remote attackers to bypass intended posting restrictions via a spoofed mail server with the mail.example.com name.

CVSS3: 5.3
2%
Низкий
около 3 лет назад
github логотип
GHSA-pqc9-8ghg-8vc2

Multiple cross-site scripting (XSS) vulnerabilities in wp-includes/functions.php in WordPress before 2.1.2-alpha allow remote attackers to inject arbitrary web script or HTML via (1) the Referer HTTP header or (2) the URI, a different vulnerability than CVE-2007-1049.

1%
Низкий
около 3 лет назад
github логотип
GHSA-pq6q-6pp2-6x56

WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure.

1%
Низкий
около 3 лет назад
github логотип
GHSA-ppxh-5qq2-77g8

WordPress before 5.3.1 allowed an unauthenticated user to make a post sticky through the REST API because of missing access control in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php.

CVSS3: 4.3
1%
Низкий
около 3 лет назад
github логотип
GHSA-pp8c-8h35-cghc

SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.

2%
Низкий
около 3 лет назад
github логотип
GHSA-pmh6-cq54-943m

WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.

CVSS3: 7.5
3%
Низкий
больше 2 лет назад
github логотип
GHSA-pj8j-hmc8-6q85

Cross-site request forgery (CSRF) vulnerability in the AdminPanel in WordPress 2.1.1 and earlier allows remote attackers to perform privileged actions as administrators, as demonstrated using the delete action in wp-admin/post.php. NOTE: this issue can be leveraged to perform cross-site scripting (XSS) attacks and steal cookies via the post parameter.

6%
Низкий
около 3 лет назад
github логотип
GHSA-pj25-83q9-ppf3

Cross-site scripting (XSS) vulnerability in the wp_get_attachment_link function in wp-includes/post-template.php in WordPress before 4.5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name, a different vulnerability than CVE-2016-5833.

CVSS3: 6.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-phhp-w7c7-3wcv

Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information.

8%
Низкий
около 3 лет назад
github логотип
GHSA-p47w-r74f-f3j5

WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possibly due to uninitialized variables.

1%
Низкий
около 3 лет назад
github логотип
GHSA-p45m-x7rq-w3r2

Cross-site scripting (XSS) vulnerability in the theme-name fallback functionality in wp-includes/class-wp-theme.php in WordPress before 4.7.1 allows remote attackers to inject arbitrary web script or HTML via a crafted directory name of a theme, related to wp-admin/includes/class-theme-installer-skin.php.

CVSS3: 6.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-p3fq-9wj3-h9c3

wp-admin/user-edit.php in WordPress before 2.0.5 allows remote authenticated users to read the metadata of an arbitrary user via a modified user_id parameter.

CVSS3: 6.5
1%
Низкий
около 3 лет назад
github логотип
GHSA-p2ph-58w4-xr4f

WordPress before 3.5.2, when the uploads directory forbids write access, allows remote attackers to obtain sensitive information via an invalid upload request, which reveals the absolute path in an XMLHttpRequest error message.

1%
Низкий
около 3 лет назад
github логотип
GHSA-mwxx-w555-5h5m

WordPress before 5.5.2 allows stored XSS via post slugs.

CVSS3: 6.1
16%
Средний
около 3 лет назад
github логотип
GHSA-mrjh-wq58-w8wr

Cross-site scripting (XSS) vulnerability in searchform.php in the AndyBlue theme before 20070607 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF portion of a URI to index.php. NOTE: this can be leveraged for PHP code execution in an administrative session.

1%
Низкий
около 3 лет назад

Уязвимостей на страницу