Lucene search

K

Gentoo Security Advisory GLSA 200701-10 (wordpress)

🗓️ 24 Sep 2008 00:00:00Reported by Copyright (C) 2008 E-Soft Inc.Type 
openvas
 openvas
🔗 plugins.openvas.org👁 12 Views

Gentoo Security Advisory GLSA 200701-10 for WordPress. Vulnerable to SQL injection, information disclosure, and cross-site scripting attacks. Users should upgrade to version 2.0.6

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
Gentoo Security Advisory GLSA 200701-10 (wordpress)
24 Sep 200800:00
openvas
Gentoo Linux
WordPress: Multiple vulnerabilities
15 Jan 200700:00
gentoo
Tenable Nessus
GLSA-200701-10 : WordPress: Multiple vulnerabilities
17 Jan 200700:00
nessus
Tenable Nessus
WordPress Trackback Charset Decoding SQL Injection
12 Jan 200700:00
nessus
Patchstack
WordPress <= 2.0.5 - Cross Site Scripting
28 Dec 200600:00
patchstack
Patchstack
WordPress <= 2.0.5 - SQL Injection
8 Jan 200700:00
patchstack
Patchstack
WordPress <= 2.0.5 - Dictionnary & Bruteforce attack
8 Jan 200700:00
patchstack
Debian CVE
CVE-2006-6808
28 Dec 200621:28
debiancve
Debian CVE
CVE-2007-0109
9 Jan 200700:28
debiancve
Debian CVE
CVE-2007-0107
9 Jan 200700:28
debiancve
Rows per page
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.57970");
  script_version("2023-07-18T05:05:36+0000");
  script_tag(name:"last_modification", value:"2023-07-18 05:05:36 +0000 (Tue, 18 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2006-6808", "CVE-2007-0107", "CVE-2007-0109");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_name("Gentoo Security Advisory GLSA 200701-10 (wordpress)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("Gentoo Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/gentoo", "ssh/login/pkg");
  script_tag(name:"insight", value:"WordPress is vulnerable to SQL injection, information disclosure, and
cross-site scripting attacks.");
  script_tag(name:"solution", value:"All WordPress users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose '>=www-apps/wordpress-2.0.6'");

  script_xref(name:"URL", value:"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200701-10");
  script_xref(name:"URL", value:"http://bugs.gentoo.org/show_bug.cgi?id=159229");
  script_tag(name:"summary", value:"The remote host is missing updates announced in
advisory GLSA 200701-10.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("pkg-lib-gentoo.inc");
include("revisions-lib.inc");

res = "";
report = "";
report = "";
if ((res = ispkgvuln(pkg:"www-apps/wordpress", unaffected: make_list("ge 2.0.6"), vulnerable: make_list("lt 2.0.6"))) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
24 Sep 2008 00:00Current
7High risk
Vulners AI Score7
CVSS26.8
EPSS0.06443
12
.json
Report