Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.704401
Categoría:Debian Local Security Checks
Título:Debian Security Advisory DSA 4401-1 (wordpress - security update)
Resumen:Several vulnerabilities were discovered in Wordpress, a web blogging;tool. They allowed remote attackers to perform various Cross-Side;Scripting (XSS) and PHP injections attacks, delete files, leak;potentially sensitive data, create posts of unauthorized types, or;cause denial-of-service by application crash.
Descripción:Summary:
Several vulnerabilities were discovered in Wordpress, a web blogging
tool. They allowed remote attackers to perform various Cross-Side
Scripting (XSS) and PHP injections attacks, delete files, leak
potentially sensitive data, create posts of unauthorized types, or
cause denial-of-service by application crash.

Affected Software/OS:
wordpress on Debian Linux

Solution:
For the stable distribution (stretch), these problems have been fixed in
version 4.7.5+dfsg-2+deb9u5.

We recommend that you upgrade your wordpress packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2019-8942
BugTraq ID: 107088
http://www.securityfocus.com/bid/107088
Debian Security Information: DSA-4401 (Google Search)
https://www.debian.org/security/2019/dsa-4401
https://www.exploit-db.com/exploits/46511/
https://www.exploit-db.com/exploits/46662/
http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html
http://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rce
https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
https://wpvulndb.com/vulnerabilities/9222
https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.