WordPress 2.1.1 Command Execution Backdoor exploi
Reporter | Title | Published | Views | Family All 15 |
---|---|---|---|---|
Exploit DB | WordPress Core 2.1.1 - '/wp-includes/theme.php?iz' Arbitrary Command Execution | 2 Mar 200700:00 | – | exploitdb |
Exploit DB | WordPress Core 2.1.1 - Arbitrary Command Execution | 2 Mar 200700:00 | – | exploitdb |
wpexploit | WordPress 2.1.1 - Command Execution Backdoor | 1 Aug 201410:58 | – | wpexploit |
Patchstack | WordPress <= 2.1.1 - Multiple Vulnerabilities | 5 Mar 200700:00 | – | patchstack |
CVE | CVE-2007-1277 | 5 Mar 200720:19 | – | cve |
Cvelist | CVE-2007-1277 | 5 Mar 200720:00 | – | cvelist |
NVD | CVE-2007-1277 | 5 Mar 200720:19 | – | nvd |
Check Point Advisories | WordPress Backdoor iz Parameter Passthru (CVE-2007-1277) | 3 Mar 201400:00 | – | checkpoint_advisories |
UbuntuCve | CVE-2007-1277 | 5 Mar 200700:00 | – | ubuntucve |
CERT | WordPress fails to properly sanitize input passed to the ix parameter in wp-includes/feed.php | 5 Mar 200700:00 | – | cert |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/22797/ |
exchange | www.exchange.xforce.ibmcloud.com/vulnerabilities/32807 |
wordpress | www.wordpress.org/news/2007/03/upgrade-212/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo