Wordpress

Wordpress

360 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.07%
  • Published 10.07.2009 21:00:00
  • Last modified 09.04.2025 00:30:58

WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message.

Exploit
  • EPSS 0.29%
  • Published 28.04.2009 16:30:03
  • Last modified 09.04.2025 00:30:58

Open redirect vulnerability in wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the backto parameter.

Exploit
  • EPSS 0.74%
  • Published 28.04.2009 16:30:03
  • Last modified 09.04.2025 00:30:58

wp-admin/upgrade.php in WordPress, probably 2.6.x, allows remote attackers to upgrade the application, and possibly cause a denial of service (application outage), via a direct request.

Exploit
  • EPSS 17.26%
  • Published 19.12.2008 18:30:00
  • Last modified 09.04.2025 00:30:58

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrar...

Exploit
  • EPSS 3.16%
  • Published 28.11.2008 19:30:00
  • Last modified 09.04.2025 00:30:58

Cross-site scripting (XSS) vulnerability in the self_link function in in the RSS Feed Generator (wp-includes/feed.php) for WordPress before 2.6.5 allows remote attackers to inject arbitrary web script or HTML via the Host header (HTTP_HOST variable).

  • EPSS 0.3%
  • Published 17.11.2008 23:30:00
  • Last modified 09.04.2025 00:30:58

WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by at...

  • EPSS 1.09%
  • Published 30.10.2008 20:56:54
  • Last modified 09.04.2025 00:30:58

The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitra...

Exploit
  • EPSS 12.57%
  • Published 28.10.2008 10:30:01
  • Last modified 09.04.2025 00:30:58

Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. ...

  • EPSS 14.59%
  • Published 18.09.2008 17:59:33
  • Last modified 09.04.2025 00:30:58

WordPress before 2.6.2 does not properly handle MySQL warnings about insertion of username strings that exceed the maximum column width of the user_login column, and does not properly handle space characters when comparing usernames, which allows rem...

  • EPSS 1.45%
  • Published 27.08.2008 15:21:00
  • Last modified 09.04.2025 00:30:58

The (1) get_edit_post_link and (2) get_edit_comment_link functions in wp-includes/link-template.php in WordPress before 2.6.1 do not force SSL communication in the intended situations, which might allow remote attackers to gain administrative access ...