5.8
CVSSv2

CVE-2010-5293

Published: 21/01/2014 Updated: 21/01/2014
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

wp-includes/comment.php in WordPress prior to 3.0.2 does not properly whitelist trackbacks and pingbacks in the blogroll, which allows remote malicious users to bypass intended spam restrictions via a crafted URL, as demonstrated by a URL that triggers a substring match.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress 2.0.11

wordpress wordpress 2.0.2

wordpress wordpress 2.0.4

wordpress wordpress 2.0.5

wordpress wordpress 2.3.1

wordpress wordpress 2.3.2

wordpress wordpress 2.3.3

wordpress wordpress 2.5

wordpress wordpress 2.8.4

wordpress wordpress 2.8.5

wordpress wordpress 2.8.5.1

wordpress wordpress 2.8.5.2

wordpress wordpress 2.8.6

wordpress wordpress 2.0

wordpress wordpress 2.1.1

wordpress wordpress 2.2.3

wordpress wordpress 2.1

wordpress wordpress 2.0.6

wordpress wordpress 2.2

wordpress wordpress 2.1.3

wordpress wordpress 2.8

wordpress wordpress 2.1.2

wordpress wordpress 2.6.3

wordpress wordpress 2.6.5

wordpress wordpress 2.2.1

wordpress wordpress 2.7

wordpress wordpress 2.6.2

wordpress wordpress 2.0.10

wordpress wordpress 2.9.1

wordpress wordpress 2.8.2

wordpress wordpress 2.6

wordpress wordpress 2.0.8

wordpress wordpress 2.0.1

wordpress wordpress 3.0

wordpress wordpress 2.0.7

wordpress wordpress 2.7.1

wordpress wordpress 2.8.3

wordpress wordpress 2.2.2

wordpress wordpress 2.0.9

wordpress wordpress 2.8.1

wordpress wordpress 2.9

wordpress wordpress 2.5.1

wordpress wordpress 2.6.1

wordpress wordpress 2.9.2

wordpress wordpress

wordpress wordpress 2.9.1.1

wordpress wordpress 2.3

Github Repositories

CSCI4349 Week 9: Honeypot MANUAL HONEYPOT SETUP git clone this repo git clone githubcom/harrystaley/CSCI4349_Week9_Honeypot open your terminal application and execute the following command vagrant up vagrant ssh wich should bring you to a new terminal prompt on your newly created linux box cd /vagrant initialize google cloud gcloud init login and instert the name o