Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.56657
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Ports: wordpress
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory.
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: wordpress

CVE-2005-4463
WordPress before 1.5.2 allows remote attackers to obtain sensitive
information via a direct request to (1) wp-includes/vars.php, (2)
wp-content/plugins/hello.php, (3) wp-admin/upgrade-functions.php, (4)
wp-admin/edit-form.php, (5) wp-settings.php, and (6)
wp-admin/edit-form-comment.php, which leaks the path in an error
message related to undefined functions or failed includes. NOTE: the
wp-admin/menu-header.php vector is already covered by CVE-2005-2110.
NOTE: the vars.php, edit-form.php, wp-settings.php, and
edit-form-comment.php vectors were also reported to affect WordPress
2.0.1.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-4463
Bugtraq: 20051221 [ECHO_ADV_24$2005] Full path disclosure on WordPress < 1.5.2 (Google Search)
http://www.securityfocus.com/archive/1/419999/100/0/threaded
http://www.securityfocus.com/archive/1/419994/100/0/threaded
Bugtraq: 20060227 WordPress 2.0.1 Multiple Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/426304/100/0/threaded
http://NeoSecurityTeam.net/advisories/Advisory-17.txt
http://echo.or.id/adv/adv24-theday-2005.txt
http://securityreason.com/securityalert/286
CopyrightCopyright (C) 2008 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.