Skip to content

Commit

Permalink
Regenerated with new updated severity classifications
Browse files Browse the repository at this point in the history
  • Loading branch information
topscoder committed May 13, 2024
1 parent ed6e6b8 commit fb15470
Show file tree
Hide file tree
Showing 9,859 changed files with 20,646 additions and 20,650 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 0.72 - SQL Injection
author: topscoder
severity: high
severity: critical
description: >
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2003-1598
metadata:
shodan-query: 'vuln:CVE-2003-1598'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,critical

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 1.2.1 - Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2004-1559
metadata:
shodan-query: 'vuln:CVE-2004-1559'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core <= 1.5 - Stored Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
Multiple cross-site scripting (XSS) vulnerabilities in template-functions-post.php in WordPress 1.5 and earlier allow remote attackers to execute arbitrary commands via the (1) content or (2) title of the post.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2005-1102
metadata:
shodan-query: 'vuln:CVE-2005-1102'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 1.5.1 - SQL Injection
author: topscoder
severity: high
severity: critical
description: >
SQL injection vulnerability in wp-trackback.php in Wordpress 1.5 and earlier allows remote attackers to execute arbitrary SQL commands via the tb_id parameter.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2005-1687
metadata:
shodan-query: 'vuln:CVE-2005-1687'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,critical

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 1.5.1.2 - SQL Injection
author: topscoder
severity: high
severity: critical
description: >
SQL injection vulnerability in template-functions-category.php in WordPress 1.5.1 allows remote attackers to execute arbitrary SQL commands via the $cat_ID variable, as demonstrated using the cat parameter to index.php.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2005-1810
metadata:
shodan-query: 'vuln:CVE-2005-1810'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,critical

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 1.5.1.3 - SQL Injection
author: topscoder
severity: high
severity: critical
description: >
SQL injection vulnerability in XMLRPC server in WordPress 1.5.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via input that is not filtered in the HTTP_RAW_POST_DATA variable, which stores the data in an XML file.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2005-2108
metadata:
shodan-query: 'vuln:CVE-2005-2108'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,critical

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 1.5.2 - Remote Code Execution
author: topscoder
severity: high
severity: critical
description: >
Direct code injection vulnerability in WordPress 1.5.1.3 and earlier allows remote attackers to execute arbitrary PHP code via the cache_lastpostdate[server] cookie.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2005-2612
metadata:
shodan-query: 'vuln:CVE-2005-2612'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,critical

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core <= 1.5.2 - SQL Injection
author: topscoder
severity: high
severity: critical
description: >
SQL injection vulnerability in WordPress 1.5.2, and possibly other versions before 2.0, allows remote attackers to execute arbitrary SQL commands via the User-Agent field in an HTTP header for a comment.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2006-1012
metadata:
shodan-query: 'vuln:CVE-2006-1012'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,critical

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 2.0.1 - Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
Cross-site scripting (XSS) vulnerability in the paging links functionality in template-functions-links.php in Wordpress 1.5.2, and possibly other versions before 2.0.1, allows remote attackers to inject arbitrary web script or HTML to Internet Explorer users via the request URI ($_SERVER['REQUEST_URI']).
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2006-1796
metadata:
shodan-query: 'vuln:CVE-2006-1796'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 2.0.3 - Remote Code Execution
author: topscoder
severity: high
severity: critical
description: >
Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2006-2667
metadata:
shodan-query: 'vuln:CVE-2006-2667'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,critical

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
Skippy WP-DB Backup (Legacy Plugin) <= 1.7 - Authenticated (Admin+) Directory Traversal
author: topscoder
severity: medium
severity: low
description: >
Directory traversal vulnerability in wp-db-backup.php in the Skippy WP-DB-Backup legacy plugin for WordPress 1.7 and earlier allows remote authenticated users with administrative privileges to read arbitrary files via a .. (dot dot) in the backup parameter to edit.php.
reference:
Expand All @@ -17,7 +17,7 @@ info:
fofa-query: "wp-content/plugins/wp-db-backup.php/"
google-query: inurl:"/wp-content/plugins/wp-db-backup.php/"
shodan-query: 'vuln:CVE-2006-4208'
tags: cve,wordpress,wp-plugin,wp-db-backup.php,medium
tags: cve,wordpress,wp-plugin,wp-db-backup.php,low

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core <= 2.0.5 - Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
Cross-site scripting (XSS) vulnerability in wp-admin/templates.php in WordPress 2.0.5 allows remote attackers to inject arbitrary web script or HTML via the file parameter. NOTE: some sources have reported this as a vulnerability in the get_file_description function in wp-admin/admin-functions.php.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2006-6808
metadata:
shodan-query: 'vuln:CVE-2006-6808'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core <= 2.0.5 - Cross-Site Request Forgery to Cross-Site Scripting
author: topscoder
severity: high
severity: medium
description: >
Cross-site scripting (XSS) vulnerability in the CSRF protection scheme in WordPress before 2.0.6 allows remote attackers to inject arbitrary web script or HTML via a CSRF attack with an invalid token and quote characters or HTML tags in URL variable names, which are not properly handled when WordPress generates a new link to verify the request.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2007-0106
metadata:
shodan-query: 'vuln:CVE-2007-0106'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,medium

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 2.0.7 - SQL Injection
author: topscoder
severity: high
severity: critical
description: >
wp-trackback.php in WordPress 2.0.6 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary SQL commands via the tb_id parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in WordPress.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2007-0233
metadata:
shodan-query: 'vuln:CVE-2007-0233'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,critical

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core <= 2.1.1 - Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
Multiple cross-site scripting (XSS) vulnerabilities in wp-includes/functions.php in WordPress before 2.1.2-alpha allow remote attackers to inject arbitrary web script or HTML via (1) the Referer HTTP header or (2) the URI, a different vulnerability than CVE-2007-1049.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2007-1230
metadata:
shodan-query: 'vuln:CVE-2007-1230'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core <= 2.1.1 - Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
Cross-site request forgery (CSRF) vulnerability in the AdminPanel in WordPress 2.1.1 and earlier allows remote attackers to perform privileged actions as administrators, as demonstrated using the delete action in wp-admin/post.php. NOTE: this issue can be leveraged to perform cross-site scripting (XSS) attacks and steal cookies via the post parameter.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2007-1244
metadata:
shodan-query: 'vuln:CVE-2007-1244'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core <= 2.1.2 - Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
Cross-site scripting (XSS) vulnerability in wp-admin/vars.php in WordPress before 2.0.10 RC2, and before 2.1.3 RC2 in the 2.1 series, allows remote authenticated users with theme privileges to inject arbitrary web script or HTML via the PATH_INFO in the administration interface, related to loose regular expression processing of PHP_SELF.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2007-1622
metadata:
shodan-query: 'vuln:CVE-2007-1622'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 2.1.3 - Authorization Bypass
author: topscoder
severity: medium
severity: high
description: >
xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users with the contributor role to bypass intended access restrictions and invoke the publish_posts functionality, which can be used to "publish a previously saved post."
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2007-1893
metadata:
shodan-query: 'vuln:CVE-2007-1893'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core <= 2.1.2 - Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
Cross-site scripting (XSS) vulnerability in wp-includes/general-template.php in WordPress before 20070309 allows remote attackers to inject arbitrary web script or HTML via the year parameter in the wp_title function.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2007-1894
metadata:
shodan-query: 'vuln:CVE-2007-1894'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core < 2.1.3 - SQL Injection
author: topscoder
severity: high
severity: critical
description: >
SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2007-1897
metadata:
shodan-query: 'vuln:CVE-2007-1897'
tags: cve,wordpress,wp-core,high
tags: cve,wordpress,wp-core,critical

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
WordPress Core <= 2.2 - Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
Cross-site scripting (XSS) vulnerability in sidebar.php in WordPress, when custom 404 pages that call get_sidebar are used, allows remote attackers to inject arbitrary web script or HTML via the query string (PHP_SELF), a different vulnerability than CVE-2007-1622.
reference:
Expand All @@ -15,7 +15,7 @@ info:
cve-id: CVE-2007-2627
metadata:
shodan-query: 'vuln:CVE-2007-2627'
tags: cve,wordpress,wp-core,medium
tags: cve,wordpress,wp-core,high

http:
- method: GET
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ info:
name: >
Akismet Spam Protection < 2.0.2 - Cross-Site Scripting
author: topscoder
severity: medium
severity: high
description: >
The Akismet Spam Protection plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the _wp_http_referer’ parameter in versions before 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
reference:
Expand All @@ -17,7 +17,7 @@ info:
fofa-query: "wp-content/plugins/akismet/"
google-query: inurl:"/wp-content/plugins/akismet/"
shodan-query: 'vuln:CVE-2007-2714'
tags: cve,wordpress,wp-plugin,akismet,medium
tags: cve,wordpress,wp-plugin,akismet,high

http:
- method: GET
Expand Down
Loading

0 comments on commit fb15470

Please sign in to comment.