6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.2 Low
EPSS
Percentile
96.4%
Package : wordpress
Version : 3.6.1+dfsg-1~deb7u11
CVE ID : CVE-2016-5387 CVE-2016-5832 CVE-2016-5834
CVE-2016-5835 CVE-2016-5838 CVE-2016-5839
Debian Bug : 828225
Several vulnerabilities were discovered in wordpress, a web blogging
tool. The Common Vulnerabilities and Exposures project identifies the
following issues.
CVE-2016-5387
WordPress allows remote attackers to bypass intended
access restrictions and remove a category attribute from a post via
unspecified vectors.
CVE-2016-5832
The customizer in WordPress allows remote attackers to
bypass intended redirection restrictions via unspecified vectors.
CVE-2016-5834
Cross-site scripting (XSS) vulnerability in the
wp_get_attachment_link function in wp-includes/post-
template.php in WordPress allows remote
attackers to inject arbitrary web script or HTML via a crafted
attachment name.
CVE-2016-5835
WordPress allows remote attackers to obtain sensitive
revision-history information by leveraging the ability to read a
post related to wp-admin/includes/ajax-actions.php and
wp-admin/revision.php.
CVE-2016-5838
WordPress allows remote attackers to bypass intended password-
change restrictions by leveraging knowledge of a cookie.
CVE-2016-5839
WordPress allows remote attackers to bypass the
sanitize_file_name protection mechanism via unspecified vectors.
For Debian 7 "Wheezy", these problems have been fixed in version
3.6.1+dfsg-1~deb7u11.
We recommend that you upgrade your wordpress packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | wordpress-l10n | < 3.6.1+dfsg-1~deb7u11 | wordpress-l10n_3.6.1+dfsg-1~deb7u11_all.deb |
Debian | 8 | all | wordpress-theme-twentyfourteen | < 4.1+dfsg-1+deb8u9 | wordpress-theme-twentyfourteen_4.1+dfsg-1+deb8u9_all.deb |
Debian | 8 | all | wordpress-l10n | < 4.1+dfsg-1+deb8u9 | wordpress-l10n_4.1+dfsg-1+deb8u9_all.deb |
Debian | 8 | all | wordpress-theme-twentythirteen | < 4.1+dfsg-1+deb8u9 | wordpress-theme-twentythirteen_4.1+dfsg-1+deb8u9_all.deb |
Debian | 7 | all | wordpress | < 3.6.1+dfsg-1~deb7u11 | wordpress_3.6.1+dfsg-1~deb7u11_all.deb |
Debian | 8 | all | wordpress | < 4.1+dfsg-1+deb8u9 | wordpress_4.1+dfsg-1+deb8u9_all.deb |
Debian | 8 | all | wordpress-theme-twentyfifteen | < 4.1+dfsg-1+deb8u9 | wordpress-theme-twentyfifteen_4.1+dfsg-1+deb8u9_all.deb |
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.2 Low
EPSS
Percentile
96.4%