CVE-2008-7216 – Peter's Math Anti-Spam Spinoff < 1.0.0 - CAPTCHA Bypass
https://notcve.org/view.php?id=CVE-2008-7216
Peter's Math Anti-Spam Spinoff plugin for WordPress generates audio CAPTCHA clips by concatenating static audio files without any additional distortion, which allows remote attackers to bypass CAPTCHA protection by reading certain bytes from the generated clip. La extensión Peter's Math Anti-Spam Spinoff para WordPress genera un clip de audio CAPTCHA concatenando ficheros de audio estático sin distorsiones adicionales, lo que permite a atacantes remotos saltarse la protección CAPTCHA leyendo los byte concretos del clip generado. The Peter's Math Anti-Spam Spinoff plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to 1.0.0. This is due to the plugin generating audio CAPTCHA clips by concatenating static audio files without any additional distortion. This makes it possible for unauthenticated attackers to bypass the Captcha Verification by reading certain bytes from the generated clip. • https://www.exploit-db.com/exploits/31029 http://docs.google.com/View?docid=df36cd52_19xzmkwqcg http://www.securityfocus.com/archive/1/486331/100/200/threaded http://www.securityfocus.com/bid/27287 https://exchange.xforce.ibmcloud.com/vulnerabilities/39688 • CWE-264: Permissions, Privileges, and Access Controls CWE-804: Guessable CAPTCHA •
CVE-2008-4616 – Spambam <= 2.1 - Authorization Bypass
https://notcve.org/view.php?id=CVE-2008-4616
The SpamBam plugin for WordPress allows remote attackers to bypass restrictions and add blog comments by using server-supplied values to calculate a shared key. El plugin SpamBam para WordPress permite a atacantes remotos evitar las restricciones y añadir comentarios al blog utilizando valores proporcionados por el servidor para calcular una clave compartida. • https://www.exploit-db.com/exploits/31030 http://securityreason.com/securityalert/4438 http://www.securityfocus.com/archive/1/486333/100/200/threaded http://www.securityfocus.com/bid/27291 https://exchange.xforce.ibmcloud.com/vulnerabilities/39690 • CWE-20: Improper Input Validation •
CVE-2008-0193 – WordPress Core 2.2.3 - '/wp-admin/edit.php?backup' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2008-0193
Cross-site scripting (XSS) vulnerability in wp-db-backup.php in WordPress 2.0.11 and earlier, and possibly 2.1.x through 2.3.x, allows remote attackers to inject arbitrary web script or HTML via the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en wp-db-backup.php de WordPress 2.0.11 y anteriores, y posiblemente 2.1.x hasta 2.3.x, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el parámetro backup en una acción wp-db-backup.php a wp-admin/edit.php. • https://www.exploit-db.com/exploits/30979 http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html http://secunia.com/advisories/29014 http://securityreason.com/securityalert/3539 http://securityvulns.ru/Sdocument755.html http://websecurity.com.ua/1676 http://www.debian.org/security/2008/dsa-1502 http://www.securityfocus.com/archive/1/485786/100/0/threaded http://www.securityfocus.com/bid/27123 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-0196
https://notcve.org/view.php?id=CVE-2008-0196
Multiple directory traversal vulnerabilities in WordPress 2.0.11 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the page parameter to certain PHP scripts under wp-admin/ or (2) the import parameter to wp-admin/admin.php, as demonstrated by discovering the full path via a request for the \..\..\wp-config pathname; and allow remote attackers to modify arbitrary files via a .. (dot dot) in the file parameter to wp-admin/templates.php. Múltiples vulnerabilidades de salto de directorio en WordPress 2.0.11 y anteriores permiten a atacantes remotos leer archivos de su elecció mediante un .. • http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html http://securityreason.com/securityalert/3539 http://securityvulns.ru/Sdocument762.html http://securityvulns.ru/Sdocument768.html http://securityvulns.ru/Sdocument772.html http://securityvulns.ru/Sdocument773.html http://websecurity.com.ua/1679 http://websecurity.com.ua/1683 http://websecurity.com.ua/1686 http://websecurity.com.ua/1687 http://www.securityfocus.com/archive/1/485786/100/0/threaded • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2008-0197 – WP-ContactForm <= 1.5 - Authenticated (Admin+) Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2008-0197
Multiple cross-site scripting (XSS) vulnerabilities in wp-contact-form/options-contactform.php in the WP-ContactForm 1.5 alpha and earlier plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) wpcf_email, (2) wpcf_subject, (3) wpcf_question, (4) wpcf_answer, (5) wpcf_success_msg, (6) wpcf_error_msg, or (7) wpcf_msg parameter to wp-admin/admin.php, or (8) the SRC attribute of an IFRAME element. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en wp-contact-form/options-contactform.php de la extensión (plugin) WP-ContactForm 1.5 alpha y anteriores para WordPress permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante los parámetros (1) wpcf_email, (2) wpcf_subject, (3) wpcf_question, (4) wpcf_answer, (5) wpcf_success_msg, (6) wpcf_error_msg, o (7) wpcf_msg parameter a wp-admin/admin.php, o (8) el atributo SRC de un elemento IFRAME. The WP-ContactForm plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the (1) wpcf_email, (2) wpcf_subject, (3) wpcf_question, (4) wpcf_answer, (5) wpcf_success_msg, (6) wpcf_error_msg, and (7) wpcf_msg parameters or the SRC attribute of an IFRAME element in versions up to, and including, 1.5 alpha due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative capabilities to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html http://securityreason.com/securityalert/3539 http://securityvulns.ru/Sdocument546.html http://securityvulns.ru/Sdocument667.html http://websecurity.com.ua/1600 http://websecurity.com.ua/1641 http://www.securityfocus.com/archive/1/485786/100/0/threaded • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •