CVE-2018-20147
- EPSS 5.79%
- Veröffentlicht 14.12.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:56
In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files.
CVE-2018-20148
- EPSS 54.86%
- Veröffentlicht 14.12.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:56
In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_t...
CVE-2018-20149
- EPSS 4.43%
- Veröffentlicht 14.12.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:57
In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data.
CVE-2018-20150
- EPSS 7.37%
- Veröffentlicht 14.12.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:57
In WordPress before 4.9.9 and 5.x before 5.0.1, crafted URLs could trigger XSS for certain use cases involving plugins.
CVE-2018-20151
- EPSS 6.8%
- Veröffentlicht 14.12.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:57
In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the p...
CVE-2018-20152
- EPSS 11.68%
- Veröffentlicht 14.12.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:57
In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input.
CVE-2018-20153
- EPSS 5.38%
- Veröffentlicht 14.12.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:00:57
In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could modify new comments made by users with greater privileges, possibly causing XSS.
CVE-2018-16873
- EPSS 56.8%
- Veröffentlicht 14.12.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:29
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically,...
CVE-2018-16874
- EPSS 5.74%
- Veröffentlicht 14.12.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:30
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only v...
CVE-2018-16872
- EPSS 0.27%
- Veröffentlicht 13.12.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:29
A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the t...