Page 118 of 701 results (0.011 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

Unrestricted file upload vulnerability in WordPress 2.5.1 and earlier might allow remote authenticated administrators to upload and execute arbitrary PHP files via the Upload section in the Write Tabs area of the dashboard. Vulnerabilidad de subida de ficheros sin restricciones en WordPress 2.5.1 y versiones anteriores podría permitir a administradores remotos autenticados subir y ejecutar archivos PHP arbitrariamente mediante la sección de Subidas en el área de Escribir Pestañas del panel de Gestión. • http://securityreason.com/securityalert/3897 http://www.securityfocus.com/archive/1/492230/100/0/threaded http://www.securityfocus.com/bid/29276 https://exchange.xforce.ibmcloud.com/vulnerabilities/42561 • CWE-20: Improper Input Validation CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.3EPSS: 1%CPEs: 68EXPL: 2

Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en la función get_category_template en wp-includes/theme.php en WordPress v2.3.3 y anteriores y v2.5, permite a atacantes remotos incluir y posiblemente ejecutar archivos PHP de su elección a través del parámetro "cat" en index.php. NOTA: parte de estos detalles han sido obtenidos de terceros. • https://www.exploit-db.com/exploits/31670 http://secunia.com/advisories/29949 http://trac.wordpress.org/changeset/7586 http://www.debian.org/security/2009/dsa-1871 http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html http://www.securityfocus.com/bid/28845 https://exchange.xforce.ibmcloud.com/vulnerabilities/41920 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 2

SQL injection vulnerability in ss_load.php in the Spreadsheet (wpSS) 0.6 and earlier plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the ss_id parameter. Vulnerabilidad de inyección de SQL en ss_load.php en la extensión de WordPress Spreadsheet (wpSS) 0.6 y anteriores permite a atacantes remotos ejecutar órdenes SQL de su elección mediante el parámetro "ss_id". The WordPress Spreadsheet plugin for WordPress is vulnerable to SQL Injection via the 'ss_id' parameter in versions up to, and including, 0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://www.exploit-db.com/exploits/5486 http://secunia.com/advisories/29938 http://timrohrer.com/blog/?p=120 http://www.securityfocus.com/bid/28894 http://www.vupen.com/english/advisories/2008/1344/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41968 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 2

SQL injection vulnerability in wp-download.php in the WP-Download 1.2 plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the dl_id parameter. Vulnerabilidad de inyección SQL en wp-download.php de la extensión WP-Download 1.2 de WordPress, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro dl_id. • https://www.exploit-db.com/exploits/5326 http://secunia.com/advisories/29608 http://www.securityfocus.com/bid/28516 https://exchange.xforce.ibmcloud.com/vulnerabilities/41552 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to (a) warning.php, (b) notice.php, and (c) inset.php in view/sniplets/, and possibly (d) modules/execute.php; the (2) url parameter to (e) view/admin/submenu.php; and the (3) page parameter to (f) view/admin/pager.php. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en el plugin Sniplets 1.1.2 y 1.2.2 para WordPress, permiten a atacantes remotos inyectar secuencias de comandos web o HTML a través de (1) parametro text en (a) warning.php, (b) notice.php y (c) inset.php en view/sniplets/ y posiblemente (d) modules/execute.php; el (2) parámetro url de (e) view/admin/submenu.phpy el (3) parámetro page en (f) view/admin/pager.php. • https://www.exploit-db.com/exploits/5194 http://secunia.com/advisories/29099 http://securityreason.com/securityalert/3706 http://www.securityfocus.com/archive/1/488734/100/0/threaded http://www.securityfocus.com/bid/27985 https://exchange.xforce.ibmcloud.com/vulnerabilities/40830 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •