Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
4.3 |
|
AV:N/AC:M/Au:N/C:N/I:P/A:N |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 24642
Publication date : 2004-09-27 22h00 +00:00
Author : Thomas Waldegger
EDB Verified : Yes
source: https://www.securityfocus.com/bid/11268/info
It is reported that Wordpress is affected by various cross-site scripting vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied URI input.
Wordpress 1.2 is reported vulnerable, however, other versions may be affected as well.
/admin-header.php?redirect=1&redirect_url=%22;alert(document.cookie)//
Exploit Database EDB-ID : 24643
Publication date : 2004-09-27 22h00 +00:00
Author : Thomas Waldegger
EDB Verified : Yes
source: https://www.securityfocus.com/bid/11268/info
It is reported that Wordpress is affected by various cross-site scripting vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied URI input.
Wordpress 1.2 is reported vulnerable, however, other versions may be affected as well.
/bookmarklet.php?popuptitle=[XSS]
/bookmarklet.php?popupurl=[XSS]
/bookmarklet.php?content=[XSS]
/bookmarklet.php?post_title=[XSS]
Exploit Database EDB-ID : 24644
Publication date : 2004-09-27 22h00 +00:00
Author : Thomas Waldegger
EDB Verified : Yes
source: https://www.securityfocus.com/bid/11268/info
It is reported that Wordpress is affected by various cross-site scripting vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied URI input.
Wordpress 1.2 is reported vulnerable, however, other versions may be affected as well.
/categories.php?action=edit&cat_ID=[XSS]
Exploit Database EDB-ID : 24646
Publication date : 2004-09-27 22h00 +00:00
Author : Thomas Waldegger
EDB Verified : Yes
source: https://www.securityfocus.com/bid/11268/info
It is reported that Wordpress is affected by various cross-site scripting vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied URI input.
Wordpress 1.2 is reported vulnerable, however, other versions may be affected as well.
/edit-comments.php?s=[XSS]
/edit-comments.php?mode=[XSS]
Exploit Database EDB-ID : 24645
Publication date : 2004-09-27 22h00 +00:00
Author : Thomas Waldegger
EDB Verified : Yes
source: https://www.securityfocus.com/bid/11268/info
It is reported that Wordpress is affected by various cross-site scripting vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied URI input.
Wordpress 1.2 is reported vulnerable, however, other versions may be affected as well.
/edit.php?s=[XSS]
Exploit Database EDB-ID : 24641
Publication date : 2004-09-27 22h00 +00:00
Author : Thomas Waldegger
EDB Verified : Yes
source: https://www.securityfocus.com/bid/11268/info
It is reported that Wordpress is affected by various cross-site scripting vulnerabilities. These issues are due to a failure of the application to properly sanitize user-supplied URI input.
Wordpress 1.2 is reported vulnerable, however, other versions may be affected as well.
/wp-login.php?redirect_to=[XSS]
/wp-login.php?mode=bookmarklet&text=[XSS]
/wp-login.php?mode=bookmarklet&popupurl=[XSS]
/wp-login.php?mode=bookmarklet&popuptitle=[XSS]
Products Mentioned
Configuraton 0
Wordpress>>Wordpress >> Version 1.2
References