CVE-2008-0206 – Captcha! <= 2.5d - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2008-0206
Multiple cross-site scripting (XSS) vulnerabilities in captcha\captcha.php in the Captcha! 2.5d and earlier plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) captcha_ttffolder, (2) captcha_numchars, (3) captcha_ttfrange, or (4) captcha_secret parameter. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en captcha\captcha.php del componente (plugin) Captcha! 2.5d y anteriores para WordPress permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante los parámetros (1) captcha_ttffolder, (2) captcha_numchars, (3) captcha_ttfrange, o (4) captcha_secret. • http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html http://securityreason.com/securityalert/3539 http://websecurity.com.ua/1588 http://www.securityfocus.com/archive/1/485786/100/0/threaded • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-0205 – Math Comment Spam Protection <= 2.1 - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2008-0205
Multiple cross-site request forgery (CSRF) vulnerabilities in math-comment-spam-protection.php in the Math Comment Spam Protection 2.1 and earlier plugin for WordPress allow remote attackers to perform actions as administrators via the (1) mcsp_opt_msg_no_answer or (2) mcsp_opt_msg_wrong_answer parameter to wp-admin/options-general.php. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en math-comment-spam-protection.php de la extensión Math Comment Spam Protection 2.1 y anteriores para WordPress permiten a atacantes remotos realizar acciones como administradores a través de los parámetros (1) mcsp_opt_msg_no_answer o (2) mcsp_opt_msg_wrong_answer de wp-admin/options-general.php. • http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html http://securityreason.com/securityalert/3539 http://websecurity.com.ua/1576 http://www.securityfocus.com/archive/1/485786/100/0/threaded • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2007-6013 – WordPress Core 1.5 - 2.3.1 - Authorization Bypass
https://notcve.org/view.php?id=CVE-2007-6013
Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash. Wordpress versiones 1.5 hasta 2.3.1, usa valores de cookies basados ??en el hash MD5 de un hash MD5 de contraseñas, lo que permite a atacantes omitir la autenticación mediante la obtención del hash MD5 desde la base de datos del usuario, y luego generar la cookie de autenticación a partir de ese hash. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html http://osvdb.org/40801 http://secunia.com/advisories/27714 http://secunia.com/advisories/28310 http://securityreason.com/securityalert/3375 http://trac.wordpress.org/ticket/5367 http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt http://www.securityfocus.com/archive/1/483927/100/0/threaded http://www.securitytracker.com/id?1018980 http://www.vupen.com/english/advisories/2007/3941 • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE-327: Use of a Broken or Risky Cryptographic Algorithm •
CVE-2007-5800 – BackUpWordPress <= 0.4.2b - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-5800
Multiple PHP remote file inclusion vulnerabilities in the BackUpWordPress 0.4.2b and earlier plugin for WordPress allow remote attackers to execute arbitrary PHP code via a URL in the bkpwp_plugin_path parameter to (1) plugins/BackUp/Archive.php; and (2) Predicate.php, (3) Writer.php, (4) Reader.php, and other unspecified scripts under plugins/BackUp/Archive/. Múltiples vulnerabilidades de inclusión de archivos remotos PHP en el plugin BackUpWordPress versiones 0.4.2b y anteriores para WordPress, permiten a atacantes remotos ejecutar código PHP arbitrario por medio de una URL en el parámetro bkpwp_plugin_path ( 1) en el archivo plug8ins/BackUp/Archive.php; y los scripts (2) Predicate.php, (3) Writer.php, (4) Reader.php y otro no especificado en plugins/BackUp/Archive/. • https://www.exploit-db.com/exploits/4593 http://osvdb.org/38476 http://osvdb.org/38477 http://osvdb.org/38478 http://osvdb.org/38479 http://wordpress.designpraxis.at/2007/11/01/backupwordpress-security-release http://wordpress.designpraxis.at/2007/11/01/security-vulnerability-in-backupwordpress http://www.securityfocus.com/bid/26290 http://www.vupen.com/english/advisories/2007/3744 https://exchange.xforce.ibmcloud.com/vulnerabilities/38212 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •
CVE-2007-5710 – WordPress Core <= 2.3 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2007-5710
Cross-site scripting (XSS) vulnerability in wp-admin/edit-post-rows.php in WordPress 2.3 allows remote attackers to inject arbitrary web script or HTML via the posts_columns array parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en wp-admin/edit-post-rows.php en WordPress 2.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través del parámetro array posts_columns. • https://www.exploit-db.com/exploits/30715 http://osvdb.org/38279 http://secunia.com/advisories/27407 http://wordpress.org/development/2007/10/wordpress-231 http://www.securityfocus.com/archive/1/482905/100/0/threaded http://www.securityfocus.com/bid/26228 http://www.vupen.com/english/advisories/2007/3640 http://www.waraxe.us/advisory-59.html https://exchange.xforce.ibmcloud.com/vulnerabilities/38166 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •