Total vulnerabilities in the database
wp-trackback.php in WordPress 2.0.6 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary SQL commands via the tb_id parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in WordPress.
Software | From | Fixed in |
---|---|---|
WordPress / wordpress | 2.0 | 2.0.x |
WordPress / wordpress | 2.0.2 | 2.0.2.x |
WordPress / wordpress | 2.0.6 | 2.0.6.x |
WordPress / wordpress | 2.0.1 | 2.0.1.x |
WordPress / wordpress | 2.0.4 | 2.0.4.x |
WordPress / wordpress | 0.6.2.1-beta_2 | 0.6.2.1-beta_2.x |
WordPress / wordpress | 1.2.1 | 1.2.1.x |
WordPress / wordpress | 0.7 | 0.7.x |
WordPress / wordpress | 0.71 | 0.71.x |
WordPress / wordpress | 2.0.5 | 2.0.5.x |
WordPress / wordpress | 1.5.2 | 1.5.2.x |
WordPress / wordpress | 2.0.3 | 2.0.3.x |
WordPress / wordpress | 1.5.1.2 | 1.5.1.2.x |
WordPress / wordpress | 1.2 | 1.2.x |
WordPress / wordpress | 1.2.2 | 1.2.2.x |
WordPress / wordpress | 1.5 | 1.5.x |
WordPress / wordpress | 1.5.1 | 1.5.1.x |
WordPress / wordpress | 0.6.2-beta_2 | 0.6.2-beta_2.x |
WordPress / wordpress | 1.5.1.3 | 1.5.1.3.x |