![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.1.2.2015.294 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DLA-294-1) |
Summary: | The remote host is missing an update for the Debian 'wordpress' package(s) announced via the DLA-294-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'wordpress' package(s) announced via the DLA-294-1 advisory. Vulnerability Insight: Several vulnerabilities have been fixed in Wordpress, the popular blogging engine. CVE-2015-2213 SQL Injection allowed a remote attacker to compromise the site. CVE-2015-5622 The robustness of the shortcodes HTML tags filter has been improved. The parsing is a bit more strict, which may affect your installation. This is the corrected version of the patch that needed to be reverted in DSA 3328-2. CVE-2015-5731 An attacker could lock a post that was being edited. CVE-2015-5732 Cross site scripting in a widget title allows an attacker to steal sensitive information. CVE-2015-5734 Fix some broken links in the legacy theme preview. The issues were discovered by Marc-Alexandre Montpas of Sucuri, Helen Hou-Sandi of the WordPress security team, Netanel Rubin of Check Point, Ivan Grigorov, Johannes Schmitt of Scrutinizer and Mohamed A. Baset. We recommend that you upgrade your wordpress packages. Affected Software/OS: 'wordpress' package(s) on Debian 6. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-2213 BugTraq ID: 76160 http://www.securityfocus.com/bid/76160 Debian Security Information: DSA-3332 (Google Search) http://www.debian.org/security/2015/dsa-3332 Debian Security Information: DSA-3383 (Google Search) http://www.debian.org/security/2015/dsa-3383 https://wpvulndb.com/vulnerabilities/8126 http://openwall.com/lists/oss-security/2015/08/04/7 http://www.securitytracker.com/id/1033178 Common Vulnerability Exposure (CVE) ID: CVE-2015-5622 BugTraq ID: 76011 http://www.securityfocus.com/bid/76011 Debian Security Information: DSA-3328 (Google Search) http://www.debian.org/security/2015/dsa-3328 https://klikki.fi/adv/wordpress3.html https://wpvulndb.com/vulnerabilities/8111 http://openwall.com/lists/oss-security/2015/07/23/18 http://www.securitytracker.com/id/1033037 Common Vulnerability Exposure (CVE) ID: CVE-2015-5731 Common Vulnerability Exposure (CVE) ID: CVE-2015-5732 https://wpvulndb.com/vulnerabilities/8131 Common Vulnerability Exposure (CVE) ID: CVE-2015-5734 BugTraq ID: 76331 http://www.securityfocus.com/bid/76331 https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html https://wpvulndb.com/vulnerabilities/8133 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |