Max CVSS | 6.8 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2017-5491 | 5.0 |
wp-mail.php in WordPress before 4.7.1 might allow remote attackers to bypass intended posting restrictions via a spoofed mail server with the mail.example.com name.
|
03-10-2019 - 00:03 | 15-01-2017 - 02:59 | |
CVE-2017-5493 | 5.0 |
wp-includes/ms-functions.php in the Multisite WordPress API in WordPress before 4.7.1 does not properly choose random numbers for keys, which makes it easier for remote attackers to bypass intended access restrictions via a crafted (1) site signup or
|
03-10-2019 - 00:03 | 15-01-2017 - 02:59 | |
CVE-2017-5488 | 4.3 |
Multiple cross-site scripting (XSS) vulnerabilities in wp-admin/update-core.php in WordPress before 4.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) version header of a plugin.
|
04-11-2017 - 01:29 | 15-01-2017 - 02:59 | |
CVE-2017-5492 | 6.8 |
Cross-site request forgery (CSRF) vulnerability in the widget-editing accessibility-mode feature in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims for requests that perform a widgets-access action,
|
04-11-2017 - 01:29 | 15-01-2017 - 02:59 | |
CVE-2017-5490 | 4.3 |
Cross-site scripting (XSS) vulnerability in the theme-name fallback functionality in wp-includes/class-wp-theme.php in WordPress before 4.7.1 allows remote attackers to inject arbitrary web script or HTML via a crafted directory name of a theme, rela
|
04-11-2017 - 01:29 | 15-01-2017 - 02:59 | |
CVE-2017-5489 | 6.8 |
Cross-site request forgery (CSRF) vulnerability in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims via vectors involving a Flash file upload.
|
04-11-2017 - 01:29 | 15-01-2017 - 02:59 | |
CVE-2017-5487 | 5.0 |
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp
|
01-09-2017 - 01:29 | 15-01-2017 - 02:59 |