Lucene search

K
mageiaGentoo FoundationMGASA-2015-0290
HistoryJul 27, 2015 - 9:54 p.m.

Updated wordpress package fixes security vulnerabilities

2015-07-2721:54:19
Gentoo Foundation
advisories.mageia.org
12

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

74.0%

WordPress versions 4.2.2 and earlier are affected by a cross-site scripting vulnerability, which could allow users with the Contributor or Author role to compromise a site (CVE-2015-5622). WordPress versions 4.2.2 and earlier are affected by an issue where it was possible for a user with Subscriber permissions to create a draft through Quick Draft (CVE-2015-5623).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchwordpress< 3.9.7-1wordpress-3.9.7-1.mga4

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

74.0%