Files
wpscan/data/wp_vulns.json
2014-07-31 11:56:14 +02:00

597 lines
239 KiB
JSON

<!DOCTYPE html>
<html class=" ">
<head prefix="og: http://ogp.me/ns# fb: http://ogp.me/ns/fb# object: http://ogp.me/ns/object# article: http://ogp.me/ns/article# profile: http://ogp.me/ns/profile#">
<meta charset='utf-8'>
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<title>wpscan/wp_vulns.json at master · wpvulndb/wpscan · GitHub</title>
<link rel="search" type="application/opensearchdescription+xml" href="/opensearch.xml" title="GitHub">
<link rel="fluid-icon" href="https://github.com/fluidicon.png" title="GitHub">
<link rel="apple-touch-icon" sizes="57x57" href="/apple-touch-icon-114.png">
<link rel="apple-touch-icon" sizes="114x114" href="/apple-touch-icon-114.png">
<link rel="apple-touch-icon" sizes="72x72" href="/apple-touch-icon-144.png">
<link rel="apple-touch-icon" sizes="144x144" href="/apple-touch-icon-144.png">
<meta property="fb:app_id" content="1401488693436528">
<meta content="@github" name="twitter:site" /><meta content="summary" name="twitter:card" /><meta content="wpvulndb/wpscan" name="twitter:title" /><meta content="wpscan - WPScan is a black box WordPress vulnerability scanner." name="twitter:description" /><meta content="https://avatars3.githubusercontent.com/u/7658332?v=1&amp;s=400" name="twitter:image:src" />
<meta content="GitHub" property="og:site_name" /><meta content="object" property="og:type" /><meta content="https://avatars3.githubusercontent.com/u/7658332?v=1&amp;s=400" property="og:image" /><meta content="wpvulndb/wpscan" property="og:title" /><meta content="https://github.com/wpvulndb/wpscan" property="og:url" /><meta content="wpscan - WPScan is a black box WordPress vulnerability scanner." property="og:description" />
<link rel="assets" href="https://assets-cdn.github.com/">
<link rel="conduit-xhr" href="https://ghconduit.com:25035">
<meta name="msapplication-TileImage" content="/windows-tile.png">
<meta name="msapplication-TileColor" content="#ffffff">
<meta name="selected-link" value="repo_source" data-pjax-transient>
<meta name="google-analytics" content="UA-3769691-2">
<meta content="collector.githubapp.com" name="octolytics-host" /><meta content="collector-cdn.github.com" name="octolytics-script-host" /><meta content="github" name="octolytics-app-id" /><meta content="57641416:6942:1FC1292:53DA0FD3" name="octolytics-dimension-request_id" />
<link rel="icon" type="image/x-icon" href="https://assets-cdn.github.com/favicon.ico">
<meta content="authenticity_token" name="csrf-param" />
<meta content="dkmeCZjvidrMpbD49NK4XuQExXg0bjNsqO75vb0e2OPrgL1EjxZwDCtarhZe0x4JDVrJKURjsdTiSGp9kJ458Q==" name="csrf-token" />
<link href="https://assets-cdn.github.com/assets/github-dd4a229825aae7299906cd058e89e2c52cf3a009.css" media="all" rel="stylesheet" type="text/css" />
<link href="https://assets-cdn.github.com/assets/github2-f3bad37be00e388dc02cd262b28d126a0c904933.css" media="all" rel="stylesheet" type="text/css" />
<meta http-equiv="x-pjax-version" content="45f3379ec045b558e37e74937d0c6ddc">
<meta name="description" content="wpscan - WPScan is a black box WordPress vulnerability scanner.">
<meta content="7658332" name="octolytics-dimension-user_id" /><meta content="wpvulndb" name="octolytics-dimension-user_login" /><meta content="21381172" name="octolytics-dimension-repository_id" /><meta content="wpvulndb/wpscan" name="octolytics-dimension-repository_nwo" /><meta content="true" name="octolytics-dimension-repository_public" /><meta content="true" name="octolytics-dimension-repository_is_fork" /><meta content="4994614" name="octolytics-dimension-repository_parent_id" /><meta content="wpscanteam/wpscan" name="octolytics-dimension-repository_parent_nwo" /><meta content="4994614" name="octolytics-dimension-repository_network_root_id" /><meta content="wpscanteam/wpscan" name="octolytics-dimension-repository_network_root_nwo" />
<link href="https://github.com/wpvulndb/wpscan/commits/master.atom" rel="alternate" title="Recent Commits to wpscan:master" type="application/atom+xml">
</head>
<body class="logged_out env-production vis-public fork page-blob">
<a href="#start-of-content" tabindex="1" class="accessibility-aid js-skip-to-content">Skip to content</a>
<div class="wrapper">
<div class="header header-logged-out">
<div class="container clearfix">
<a class="header-logo-wordmark" href="https://github.com/">
<span class="mega-octicon octicon-logo-github"></span>
</a>
<div class="header-actions">
<a class="button primary" href="/join">Sign up</a>
<a class="button signin" href="/login?return_to=%2Fwpvulndb%2Fwpscan%2Fblob%2Fmaster%2Fdata%2Fwp_vulns.json">Sign in</a>
</div>
<div class="command-bar js-command-bar in-repository">
<ul class="top-nav">
<li class="explore"><a href="/explore">Explore</a></li>
<li class="features"><a href="/features">Features</a></li>
<li class="enterprise"><a href="https://enterprise.github.com/">Enterprise</a></li>
<li class="blog"><a href="/blog">Blog</a></li>
</ul>
<form accept-charset="UTF-8" action="/search" class="command-bar-form" id="top_search_form" method="get">
<div class="commandbar">
<span class="message"></span>
<input type="text" data-hotkey="s, /" name="q" id="js-command-bar-field" placeholder="Search or type a command" tabindex="1" autocapitalize="off"
data-repo="wpvulndb/wpscan"
>
<div class="display hidden"></div>
</div>
<input type="hidden" name="nwo" value="wpvulndb/wpscan">
<div class="select-menu js-menu-container js-select-menu search-context-select-menu">
<span class="minibutton select-menu-button js-menu-target" role="button" aria-haspopup="true">
<span class="js-select-button">This repository</span>
</span>
<div class="select-menu-modal-holder js-menu-content js-navigation-container" aria-hidden="true">
<div class="select-menu-modal">
<div class="select-menu-item js-navigation-item js-this-repository-navigation-item selected">
<span class="select-menu-item-icon octicon octicon-check"></span>
<input type="radio" class="js-search-this-repository" name="search_target" value="repository" checked="checked">
<div class="select-menu-item-text js-select-button-text">This repository</div>
</div> <!-- /.select-menu-item -->
<div class="select-menu-item js-navigation-item js-all-repositories-navigation-item">
<span class="select-menu-item-icon octicon octicon-check"></span>
<input type="radio" name="search_target" value="global">
<div class="select-menu-item-text js-select-button-text">All repositories</div>
</div> <!-- /.select-menu-item -->
</div>
</div>
</div>
<span class="help tooltipped tooltipped-s" aria-label="Show command bar help">
<span class="octicon octicon-question"></span>
</span>
<input type="hidden" name="ref" value="cmdform">
</form>
</div>
</div>
</div>
<div id="start-of-content" class="accessibility-aid"></div>
<div class="site" itemscope itemtype="http://schema.org/WebPage">
<div id="js-flash-container">
</div>
<div class="pagehead repohead instapaper_ignore readability-menu">
<div class="container">
<ul class="pagehead-actions">
<li>
<a href="/login?return_to=%2Fwpvulndb%2Fwpscan"
class="minibutton with-count star-button tooltipped tooltipped-n"
aria-label="You must be signed in to star a repository" rel="nofollow">
<span class="octicon octicon-star"></span>
Star
</a>
<a class="social-count js-social-count" href="/wpvulndb/wpscan/stargazers">
0
</a>
</li>
<li>
<a href="/login?return_to=%2Fwpvulndb%2Fwpscan"
class="minibutton with-count js-toggler-target fork-button tooltipped tooltipped-n"
aria-label="You must be signed in to fork a repository" rel="nofollow">
<span class="octicon octicon-repo-forked"></span>
Fork
</a>
<a href="/wpvulndb/wpscan/network" class="social-count">
122
</a>
</li>
</ul>
<h1 itemscope itemtype="http://data-vocabulary.org/Breadcrumb" class="entry-title public">
<span class="mega-octicon octicon-repo-forked"></span>
<span class="author"><a href="/wpvulndb" class="url fn" itemprop="url" rel="author"><span itemprop="title">wpvulndb</span></a></span><!--
--><span class="path-divider">/</span><!--
--><strong><a href="/wpvulndb/wpscan" class="js-current-repository js-repo-home-link">wpscan</a></strong>
<span class="page-context-loader">
<img alt="" height="16" src="https://assets-cdn.github.com/images/spinners/octocat-spinner-32.gif" width="16" />
</span>
<span class="fork-flag">
<span class="text">forked from <a href="/wpscanteam/wpscan">wpscanteam/wpscan</a></span>
</span>
</h1>
</div><!-- /.container -->
</div><!-- /.repohead -->
<div class="container">
<div class="repository-with-sidebar repo-container new-discussion-timeline ">
<div class="repository-sidebar clearfix">
<div class="sunken-menu vertical-right repo-nav js-repo-nav js-repository-container-pjax js-octicon-loaders" data-issue-count-url="/wpvulndb/wpscan/issues/counts">
<div class="sunken-menu-contents">
<ul class="sunken-menu-group">
<li class="tooltipped tooltipped-w" aria-label="Code">
<a href="/wpvulndb/wpscan" aria-label="Code" class="selected js-selected-navigation-item sunken-menu-item" data-hotkey="g c" data-pjax="true" data-selected-links="repo_source repo_downloads repo_commits repo_releases repo_tags repo_branches /wpvulndb/wpscan">
<span class="octicon octicon-code"></span> <span class="full-word">Code</span>
<img alt="" class="mini-loader" height="16" src="https://assets-cdn.github.com/images/spinners/octocat-spinner-32.gif" width="16" />
</a> </li>
<li class="tooltipped tooltipped-w" aria-label="Pull Requests">
<a href="/wpvulndb/wpscan/pulls" aria-label="Pull Requests" class="js-selected-navigation-item sunken-menu-item js-disable-pjax" data-hotkey="g p" data-selected-links="repo_pulls /wpvulndb/wpscan/pulls">
<span class="octicon octicon-git-pull-request"></span> <span class="full-word">Pull Requests</span>
<span class="js-pull-replace-counter"></span>
<img alt="" class="mini-loader" height="16" src="https://assets-cdn.github.com/images/spinners/octocat-spinner-32.gif" width="16" />
</a> </li>
</ul>
<div class="sunken-menu-separator"></div>
<ul class="sunken-menu-group">
<li class="tooltipped tooltipped-w" aria-label="Pulse">
<a href="/wpvulndb/wpscan/pulse" aria-label="Pulse" class="js-selected-navigation-item sunken-menu-item" data-pjax="true" data-selected-links="pulse /wpvulndb/wpscan/pulse">
<span class="octicon octicon-pulse"></span> <span class="full-word">Pulse</span>
<img alt="" class="mini-loader" height="16" src="https://assets-cdn.github.com/images/spinners/octocat-spinner-32.gif" width="16" />
</a> </li>
<li class="tooltipped tooltipped-w" aria-label="Graphs">
<a href="/wpvulndb/wpscan/graphs" aria-label="Graphs" class="js-selected-navigation-item sunken-menu-item" data-pjax="true" data-selected-links="repo_graphs repo_contributors /wpvulndb/wpscan/graphs">
<span class="octicon octicon-graph"></span> <span class="full-word">Graphs</span>
<img alt="" class="mini-loader" height="16" src="https://assets-cdn.github.com/images/spinners/octocat-spinner-32.gif" width="16" />
</a> </li>
</ul>
</div>
</div>
<div class="only-with-full-nav">
<div class="clone-url open"
data-protocol-type="http"
data-url="/users/set_protocol?protocol_selector=http&amp;protocol_type=clone">
<h3><strong>HTTPS</strong> clone URL</h3>
<div class="input-group">
<input type="text" class="input-mini input-monospace js-url-field"
value="https://github.com/wpvulndb/wpscan.git" readonly="readonly">
<span class="input-group-button">
<button aria-label="Copy to clipboard" class="js-zeroclipboard minibutton zeroclipboard-button" data-clipboard-text="https://github.com/wpvulndb/wpscan.git" data-copied-hint="Copied!" type="button"><span class="octicon octicon-clippy"></span></button>
</span>
</div>
</div>
<div class="clone-url "
data-protocol-type="subversion"
data-url="/users/set_protocol?protocol_selector=subversion&amp;protocol_type=clone">
<h3><strong>Subversion</strong> checkout URL</h3>
<div class="input-group">
<input type="text" class="input-mini input-monospace js-url-field"
value="https://github.com/wpvulndb/wpscan" readonly="readonly">
<span class="input-group-button">
<button aria-label="Copy to clipboard" class="js-zeroclipboard minibutton zeroclipboard-button" data-clipboard-text="https://github.com/wpvulndb/wpscan" data-copied-hint="Copied!" type="button"><span class="octicon octicon-clippy"></span></button>
</span>
</div>
</div>
<p class="clone-options">You can clone with
<a href="#" class="js-clone-selector" data-protocol="http">HTTPS</a>
or <a href="#" class="js-clone-selector" data-protocol="subversion">Subversion</a>.
<a href="https://help.github.com/articles/which-remote-url-should-i-use" class="help tooltipped tooltipped-n" aria-label="Get help on which URL is right for you.">
<span class="octicon octicon-question"></span>
</a>
</p>
<a href="/wpvulndb/wpscan/archive/master.zip"
class="minibutton sidebar-button"
aria-label="Download wpvulndb/wpscan as a zip file"
title="Download wpvulndb/wpscan as a zip file"
rel="nofollow">
<span class="octicon octicon-cloud-download"></span>
Download ZIP
</a>
</div>
</div><!-- /.repository-sidebar -->
<div id="js-repo-pjax-container" class="repository-content context-loader-container" data-pjax-container>
<a href="/wpvulndb/wpscan/blob/88990fd78fc562b0631aae9427203afe0e0e1a02/data/wp_vulns.json" class="hidden js-permalink-shortcut" data-hotkey="y">Permalink</a>
<!-- blob contrib key: blob_contributors:v21:9241b9885168cdfbbc3f94c350196f96 -->
<div class="file-navigation">
<div class="select-menu js-menu-container js-select-menu" >
<span class="minibutton select-menu-button js-menu-target css-truncate" data-hotkey="w"
data-master-branch="master"
data-ref="master"
title="master"
role="button" aria-label="Switch branches or tags" tabindex="0" aria-haspopup="true">
<span class="octicon octicon-git-branch"></span>
<i>branch:</i>
<span class="js-select-button css-truncate-target">master</span>
</span>
<div class="select-menu-modal-holder js-menu-content js-navigation-container" data-pjax aria-hidden="true">
<div class="select-menu-modal">
<div class="select-menu-header">
<span class="select-menu-title">Switch branches/tags</span>
<span class="octicon octicon-x js-menu-close" role="button" aria-label="Close"></span>
</div> <!-- /.select-menu-header -->
<div class="select-menu-filters">
<div class="select-menu-text-filter">
<input type="text" aria-label="Filter branches/tags" id="context-commitish-filter-field" class="js-filterable-field js-navigation-enable" placeholder="Filter branches/tags">
</div>
<div class="select-menu-tabs">
<ul>
<li class="select-menu-tab">
<a href="#" data-tab-filter="branches" class="js-select-menu-tab">Branches</a>
</li>
<li class="select-menu-tab">
<a href="#" data-tab-filter="tags" class="js-select-menu-tab">Tags</a>
</li>
</ul>
</div><!-- /.select-menu-tabs -->
</div><!-- /.select-menu-filters -->
<div class="select-menu-list select-menu-tab-bucket js-select-menu-tab-bucket" data-tab-filter="branches">
<div data-filterable-for="context-commitish-filter-field" data-filterable-type="substring">
<div class="select-menu-item js-navigation-item ">
<span class="select-menu-item-icon octicon octicon-check"></span>
<a href="/wpvulndb/wpscan/blob/gh-pages/data/wp_vulns.json"
data-name="gh-pages"
data-skip-pjax="true"
rel="nofollow"
class="js-navigation-open select-menu-item-text css-truncate-target"
title="gh-pages">gh-pages</a>
</div> <!-- /.select-menu-item -->
<div class="select-menu-item js-navigation-item selected">
<span class="select-menu-item-icon octicon octicon-check"></span>
<a href="/wpvulndb/wpscan/blob/master/data/wp_vulns.json"
data-name="master"
data-skip-pjax="true"
rel="nofollow"
class="js-navigation-open select-menu-item-text css-truncate-target"
title="master">master</a>
</div> <!-- /.select-menu-item -->
</div>
<div class="select-menu-no-results">Nothing to show</div>
</div> <!-- /.select-menu-list -->
<div class="select-menu-list select-menu-tab-bucket js-select-menu-tab-bucket" data-tab-filter="tags">
<div data-filterable-for="context-commitish-filter-field" data-filterable-type="substring">
<div class="select-menu-item js-navigation-item ">
<span class="select-menu-item-icon octicon octicon-check"></span>
<a href="/wpvulndb/wpscan/tree/2.4.1/data/wp_vulns.json"
data-name="2.4.1"
data-skip-pjax="true"
rel="nofollow"
class="js-navigation-open select-menu-item-text css-truncate-target"
title="2.4.1">2.4.1</a>
</div> <!-- /.select-menu-item -->
<div class="select-menu-item js-navigation-item ">
<span class="select-menu-item-icon octicon octicon-check"></span>
<a href="/wpvulndb/wpscan/tree/2.4/data/wp_vulns.json"
data-name="2.4"
data-skip-pjax="true"
rel="nofollow"
class="js-navigation-open select-menu-item-text css-truncate-target"
title="2.4">2.4</a>
</div> <!-- /.select-menu-item -->
<div class="select-menu-item js-navigation-item ">
<span class="select-menu-item-icon octicon octicon-check"></span>
<a href="/wpvulndb/wpscan/tree/2.3/data/wp_vulns.json"
data-name="2.3"
data-skip-pjax="true"
rel="nofollow"
class="js-navigation-open select-menu-item-text css-truncate-target"
title="2.3">2.3</a>
</div> <!-- /.select-menu-item -->
<div class="select-menu-item js-navigation-item ">
<span class="select-menu-item-icon octicon octicon-check"></span>
<a href="/wpvulndb/wpscan/tree/2.2/data/wp_vulns.json"
data-name="2.2"
data-skip-pjax="true"
rel="nofollow"
class="js-navigation-open select-menu-item-text css-truncate-target"
title="2.2">2.2</a>
</div> <!-- /.select-menu-item -->
<div class="select-menu-item js-navigation-item ">
<span class="select-menu-item-icon octicon octicon-check"></span>
<a href="/wpvulndb/wpscan/tree/2.1/data/wp_vulns.json"
data-name="2.1"
data-skip-pjax="true"
rel="nofollow"
class="js-navigation-open select-menu-item-text css-truncate-target"
title="2.1">2.1</a>
</div> <!-- /.select-menu-item -->
</div>
<div class="select-menu-no-results">Nothing to show</div>
</div> <!-- /.select-menu-list -->
</div> <!-- /.select-menu-modal -->
</div> <!-- /.select-menu-modal-holder -->
</div> <!-- /.select-menu -->
<div class="button-group right">
<a href="/wpvulndb/wpscan/find/master"
class="js-show-file-finder minibutton empty-icon tooltipped tooltipped-s"
data-pjax
data-hotkey="t"
aria-label="Quickly jump between files">
<span class="octicon octicon-list-unordered"></span>
</a>
<button class="js-zeroclipboard minibutton zeroclipboard-button"
data-clipboard-text="data/wp_vulns.json"
aria-label="Copy to clipboard"
data-copied-hint="Copied!">
<span class="octicon octicon-clippy"></span>
</button>
</div>
<div class="breadcrumb">
<span class='repo-root js-repo-root'><span itemscope="" itemtype="http://data-vocabulary.org/Breadcrumb"><a href="/wpvulndb/wpscan" data-branch="master" data-direction="back" data-pjax="true" itemscope="url"><span itemprop="title">wpscan</span></a></span></span><span class="separator"> / </span><span itemscope="" itemtype="http://data-vocabulary.org/Breadcrumb"><a href="/wpvulndb/wpscan/tree/master/data" data-branch="master" data-direction="back" data-pjax="true" itemscope="url"><span itemprop="title">data</span></a></span><span class="separator"> / </span><strong class="final-path">wp_vulns.json</strong>
</div>
</div>
<div class="commit file-history-tease">
<img alt="wpvulndb" class="main-avatar" data-user="7658332" height="24" src="https://avatars1.githubusercontent.com/u/7658332?v=1&amp;s=48" width="24" />
<span class="author"><a href="/wpvulndb" rel="author">wpvulndb</a></span>
<time datetime="2014-07-31T11:41:49+02:00" is="relative-time">July 31, 2014</time>
<div class="commit-title">
<a href="/wpvulndb/wpscan/commit/55f9cb78da92f87febc1337a79e09e7976c944b2" class="message" data-pjax="true" title="Commit from WPVULNDB">Commit from WPVULNDB</a>
</div>
<div class="participation">
<p class="quickstat"><a href="#blob_contributors_box" rel="facebox"><strong>1</strong> contributor</a></p>
</div>
<div id="blob_contributors_box" style="display:none">
<h2 class="facebox-header">Users who have contributed to this file</h2>
<ul class="facebox-user-list">
<li class="facebox-user-list-item">
<img alt="wpvulndb" data-user="7658332" height="24" src="https://avatars1.githubusercontent.com/u/7658332?v=1&amp;s=48" width="24" />
<a href="/wpvulndb">wpvulndb</a>
</li>
</ul>
</div>
</div>
<div class="file-box">
<div class="file">
<div class="meta clearfix">
<div class="info file-name">
<span>1 lines (1 sloc)</span>
<span class="meta-divider"></span>
<span>147.129 kb</span>
</div>
<div class="actions">
<div class="button-group">
<a href="/wpvulndb/wpscan/raw/master/data/wp_vulns.json" class="minibutton " id="raw-url">Raw</a>
<a href="/wpvulndb/wpscan/blame/master/data/wp_vulns.json" class="minibutton js-update-url-with-hash">Blame</a>
<a href="/wpvulndb/wpscan/commits/master/data/wp_vulns.json" class="minibutton " rel="nofollow">History</a>
</div><!-- /.button-group -->
<a class="octicon-button disabled tooltipped tooltipped-w" href="#"
aria-label="You must be signed in to make or propose changes"><span class="octicon octicon-pencil"></span></a>
<a class="octicon-button danger disabled tooltipped tooltipped-w" href="#"
aria-label="You must be signed in to make or propose changes">
<span class="octicon octicon-trashcan"></span>
</a>
</div><!-- /.actions -->
</div>
<div class="blob-wrapper data type-json">
<table class="file-code file-diff tab-size-8">
<tr class="file-code-line">
<td class="blob-line-nums">
<span id="L1" rel="#L1">1</span>
</td>
<td class="blob-line-code"><div class="code-body highlight"><pre><div class='line' id='LC1'>[{&quot;3.8.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88075,&quot;title&quot;:&quot;Administrator-exploitable blind SQLi in WordPress 1.0 - 3.8.1&quot;,&quot;url&quot;:&quot;https://security.dxw.com/advisories/sqli-in-wordpress-3-6-1/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.103Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.103Z&quot;},{&quot;id&quot;:88076,&quot;title&quot;:&quot;Potential Authentication Cookie Forgery&quot;,&quot;url&quot;:&quot;https://labs.mwrinfosecurity.com/blog/2014/04/11/wordpress-auth-cookie-forgery/,https://github.com/WordPress/WordPress/commit/78a915e0e5927cf413aa6c2cef2fca3dc587f8be&quot;,&quot;osvdb&quot;:&quot;105620&quot;,&quot;cve&quot;:&quot;2014-0166&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.173Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.173Z&quot;,&quot;fixed_in&quot;:&quot;3.8.2&quot;},{&quot;id&quot;:88078,&quot;title&quot;:&quot;Plupload Unspecified XSS&quot;,&quot;osvdb&quot;:&quot;105622&quot;,&quot;secunia&quot;:&quot;57769&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;fixed_in&quot;:&quot;3.8.2&quot;}]}},{&quot;3.8&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88079,&quot;title&quot;:&quot;wp-admin/options-writing.php Cleartext Admin Credentials Disclosure&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Dec/135&quot;,&quot;osvdb&quot;:&quot;101101&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.315Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.315Z&quot;}]}},{&quot;3.7.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88076,&quot;title&quot;:&quot;Potential Authentication Cookie Forgery&quot;,&quot;url&quot;:&quot;https://labs.mwrinfosecurity.com/blog/2014/04/11/wordpress-auth-cookie-forgery/,https://github.com/WordPress/WordPress/commit/78a915e0e5927cf413aa6c2cef2fca3dc587f8be&quot;,&quot;osvdb&quot;:&quot;105620&quot;,&quot;cve&quot;:&quot;2014-0166&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.173Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.173Z&quot;,&quot;fixed_in&quot;:&quot;3.7.2&quot;},{&quot;id&quot;:88079,&quot;title&quot;:&quot;wp-admin/options-writing.php Cleartext Admin Credentials Disclosure&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Dec/135&quot;,&quot;osvdb&quot;:&quot;101101&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.315Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.315Z&quot;},{&quot;id&quot;:88078,&quot;title&quot;:&quot;Plupload Unspecified XSS&quot;,&quot;osvdb&quot;:&quot;105622&quot;,&quot;secunia&quot;:&quot;57769&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;fixed_in&quot;:&quot;3.7.2&quot;}]}},{&quot;3.6&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88080,&quot;title&quot;:&quot;PHP Object Injection&quot;,&quot;url&quot;:&quot;http://vagosec.org/2013/09/wordpress-php-object-injection/,http://www.openwall.com/lists/oss-security/2013/09/12/1,http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4340,http://core.trac.wordpress.org/changeset/25325&quot;,&quot;osvdb&quot;:&quot;97211&quot;,&quot;cve&quot;:&quot;2013-4338&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.580Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.580Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88081,&quot;title&quot;:&quot;wp-includes/functions.php get_allowed_mime_types Function SWF / EXE File Upload XSS Weakness&quot;,&quot;url&quot;:&quot;http://core.trac.wordpress.org/changeset/25322&quot;,&quot;osvdb&quot;:&quot;97210&quot;,&quot;cve&quot;:&quot;2013-5739&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.628Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.628Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88083,&quot;title&quot;:&quot;wp-admin/includes/post.php user_ID Parameter Manipulation Post Authorship Spoofing&quot;,&quot;url&quot;:&quot;http://core.trac.wordpress.org/changeset/25321&quot;,&quot;osvdb&quot;:&quot;97213&quot;,&quot;cve&quot;:&quot;2013-4340&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.712Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.712Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88084,&quot;title&quot;:&quot;wp-includes/functions.php get_allowed_mime_types Function HTML File Upload XSS Weakness&quot;,&quot;url&quot;:&quot;http://core.trac.wordpress.org/changeset/25322&quot;,&quot;osvdb&quot;:&quot;97214&quot;,&quot;cve&quot;:&quot;2013-5738&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.756Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.756Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88085,&quot;title&quot;:&quot;Multiple Function Path Disclosure&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Nov/220&quot;,&quot;osvdb&quot;:&quot;100487&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.804Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.804Z&quot;},{&quot;id&quot;:88086,&quot;title&quot;:&quot;Multiple Script Arbitrary Site Redirect&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Dec/174&quot;,&quot;osvdb&quot;:&quot;101181&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.847Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.847Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88087,&quot;title&quot;:&quot;wp-admin/edit-tags.php _wp_http_referer Parameter Reflected XSS&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Dec/174&quot;,&quot;osvdb&quot;:&quot;101182&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.892Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.892Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.5.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88088,&quot;title&quot;:&quot;Media Library Multiple Function Path Disclosure&quot;,&quot;url&quot;:&quot;http://websecurity.com.ua/6795/&quot;,&quot;osvdb&quot;:&quot;100484&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.940Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.940Z&quot;},{&quot;id&quot;:88089,&quot;title&quot;:&quot;SWFUpload Content Spoofing&quot;,&quot;url&quot;:&quot;http://bot24.blogspot.ca/2013/04/swfupload-object-injectioncsrf.html,https://github.com/wpscanteam/wpscan/issues/243&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.987Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.987Z&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.5.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88090,&quot;title&quot;:&quot;Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jul/70&quot;,&quot;osvdb&quot;:&quot;95060&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88091,&quot;title&quot;:&quot;WordPress 3.4-3.5.1 DoS in class-phpass.php&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jun/65&quot;,&quot;osvdb&quot;:&quot;94235&quot;,&quot;cve&quot;:&quot;2013-2173&quot;,&quot;secunia&quot;:&quot;53676&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.129Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.129Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88092,&quot;title&quot;:&quot;WordPress Multiple XSS&quot;,&quot;osvdb&quot;:&quot;94791,94785,94786,94790&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.176Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.176Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88093,&quot;title&quot;:&quot;WordPress TinyMCE Plugin Flash Applet Unspecified Spoofing Weakness&quot;,&quot;osvdb&quot;:&quot;94787&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.220Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.220Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88094,&quot;title&quot;:&quot;WordPress File Upload Unspecified Path Disclosure&quot;,&quot;osvdb&quot;:&quot;94788&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.267Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88095,&quot;title&quot;:&quot;WordPress 3.5-3.5.1 oEmbed Unspecified XML External Entity (XXE) Arbitrary File Disclosure&quot;,&quot;osvdb&quot;:&quot;94789&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.313Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.313Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88096,&quot;title&quot;:&quot;WordPress 3.5-3.5.1 Multiple Role Remote Privilege Escalation&quot;,&quot;osvdb&quot;:&quot;94783&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.358Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.358Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88097,&quot;title&quot;:&quot;WordPress 3.5-3.5.1 HTTP API Unspecified Server Side Request Forgery (SSRF)&quot;,&quot;osvdb&quot;:&quot;94784&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.403Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.403Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.5&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88090,&quot;title&quot;:&quot;Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jul/70&quot;,&quot;osvdb&quot;:&quot;95060&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88098,&quot;title&quot;:&quot;WordPress 3.4 - 3.5.1 DoS in class-phpass.php&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jun/65&quot;,&quot;osvdb&quot;:&quot;94235&quot;,&quot;cve&quot;:&quot;2013-2173&quot;,&quot;secunia&quot;:&quot;53676&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.546Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.546Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88099,&quot;title&quot;:&quot;WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)&quot;,&quot;url&quot;:&quot;https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88102,&quot;title&quot;:&quot;Shortcodes / Post Content Multiple Unspecified XSS&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/57554,http://securitytracker.com/id?1028045&quot;,&quot;osvdb&quot;:&quot;89576&quot;,&quot;cve&quot;:&quot;2013-0236&quot;,&quot;secunia&quot;:&quot;51967&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.774Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.774Z&quot;,&quot;fixed_in&quot;:&quot;3.5.1&quot;},{&quot;id&quot;:88078,&quot;title&quot;:&quot;Plupload Unspecified XSS&quot;,&quot;osvdb&quot;:&quot;105622&quot;,&quot;secunia&quot;:&quot;57769&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;fixed_in&quot;:&quot;3.5.1&quot;}]}},{&quot;3.4.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88090,&quot;title&quot;:&quot;Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jul/70&quot;,&quot;osvdb&quot;:&quot;95060&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88098,&quot;title&quot;:&quot;WordPress 3.4 - 3.5.1 DoS in class-phpass.php&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jun/65&quot;,&quot;osvdb&quot;:&quot;94235&quot;,&quot;cve&quot;:&quot;2013-2173&quot;,&quot;secunia&quot;:&quot;53676&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.546Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.546Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88099,&quot;title&quot;:&quot;WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)&quot;,&quot;url&quot;:&quot;https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;},{&quot;id&quot;:88103,&quot;title&quot;:&quot;WordPress 3.4.2 Cross Site Request Forgery&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:23.016Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:23.016Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88078,&quot;title&quot;:&quot;Plupload Unspecified XSS&quot;,&quot;osvdb&quot;:&quot;105622&quot;,&quot;secunia&quot;:&quot;57769&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;fixed_in&quot;:&quot;3.5.1&quot;}]}},{&quot;3.4.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88090,&quot;title&quot;:&quot;Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jul/70&quot;,&quot;osvdb&quot;:&quot;95060&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88098,&quot;title&quot;:&quot;WordPress 3.4 - 3.5.1 DoS in class-phpass.php&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jun/65&quot;,&quot;osvdb&quot;:&quot;94235&quot;,&quot;cve&quot;:&quot;2013-2173&quot;,&quot;secunia&quot;:&quot;53676&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.546Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.546Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88099,&quot;title&quot;:&quot;WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)&quot;,&quot;url&quot;:&quot;https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88078,&quot;title&quot;:&quot;Plupload Unspecified XSS&quot;,&quot;osvdb&quot;:&quot;105622&quot;,&quot;secunia&quot;:&quot;57769&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;fixed_in&quot;:&quot;3.5.1&quot;}]}},{&quot;3.4&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88090,&quot;title&quot;:&quot;Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jul/70&quot;,&quot;osvdb&quot;:&quot;95060&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.080Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88098,&quot;title&quot;:&quot;WordPress 3.4 - 3.5.1 DoS in class-phpass.php&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2013/Jun/65&quot;,&quot;osvdb&quot;:&quot;94235&quot;,&quot;cve&quot;:&quot;2013-2173&quot;,&quot;secunia&quot;:&quot;53676&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.546Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.546Z&quot;,&quot;fixed_in&quot;:&quot;3.5.2&quot;},{&quot;id&quot;:88099,&quot;title&quot;:&quot;WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)&quot;,&quot;url&quot;:&quot;https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88078,&quot;title&quot;:&quot;Plupload Unspecified XSS&quot;,&quot;osvdb&quot;:&quot;105622&quot;,&quot;secunia&quot;:&quot;57769&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;fixed_in&quot;:&quot;3.5.1&quot;}]}},{&quot;3.4-beta4&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88099,&quot;title&quot;:&quot;WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)&quot;,&quot;url&quot;:&quot;https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;},{&quot;id&quot;:88104,&quot;title&quot;:&quot;Wordpress 3.3.1 Multiple CSRF Vulnerabilities&quot;,&quot;exploitdb&quot;:&quot;18791&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.023Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.023Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88078,&quot;title&quot;:&quot;Plupload Unspecified XSS&quot;,&quot;osvdb&quot;:&quot;105622&quot;,&quot;secunia&quot;:&quot;57769&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;fixed_in&quot;:&quot;3.5.1&quot;}]}},{&quot;3.3.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88099,&quot;title&quot;:&quot;WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)&quot;,&quot;url&quot;:&quot;https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88078,&quot;title&quot;:&quot;Plupload Unspecified XSS&quot;,&quot;osvdb&quot;:&quot;105622&quot;,&quot;secunia&quot;:&quot;57769&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;fixed_in&quot;:&quot;3.5.1&quot;}]}},{&quot;3.3.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88099,&quot;title&quot;:&quot;WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)&quot;,&quot;url&quot;:&quot;https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.603Z&quot;},{&quot;id&quot;:88104,&quot;title&quot;:&quot;Wordpress 3.3.1 Multiple CSRF Vulnerabilities&quot;,&quot;exploitdb&quot;:&quot;18791&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.023Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.023Z&quot;},{&quot;id&quot;:88105,&quot;title&quot;:&quot;WordPress 3.3.2 Cross Site Scripting&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.org/files/113254&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.591Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.591Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:88078,&quot;title&quot;:&quot;Plupload Unspecified XSS&quot;,&quot;osvdb&quot;:&quot;105622&quot;,&quot;secunia&quot;:&quot;57769&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.267Z&quot;,&quot;fixed_in&quot;:&quot;3.5.1&quot;}]}},{&quot;3.3.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88109,&quot;title&quot;:&quot;Multiple vulnerabilities including XSS and Privilege Escalation&quot;,&quot;url&quot;:&quot;http://wordpress.org/news/2012/04/wordpress-3-3-2/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.030Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.030Z&quot;},{&quot;id&quot;:88110,&quot;title&quot;:&quot;Wordpress 3.3.1 - Multiple CSRF Vulnerabilities&quot;,&quot;exploitdb&quot;:&quot;18791&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.079Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.079Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88112,&quot;title&quot;:&quot;Reflected Cross-Site Scripting in WordPress 3.3&quot;,&quot;url&quot;:&quot;http://oldmanlab.blogspot.com/2012/01/wordpress-33-xss-vulnerability.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.468Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.468Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.2.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.1.4&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.1.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88113,&quot;title&quot;:&quot;wp-admin/link-manager.php Multiple Parameter SQL Injection&quot;,&quot;osvdb&quot;:&quot;73723&quot;,&quot;secunia&quot;:&quot;45099&quot;,&quot;exploitdb&quot;:&quot;17465&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:26.903Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:26.903Z&quot;,&quot;fixed_in&quot;:&quot;3.1.4&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.1.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88114,&quot;title&quot;:&quot;Wordpress \u003c= 3.1.2 Clickjacking Vulnerability&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2011/Sep/219,http://www.securityfocus.com/bid/49730&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:27.306Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:27.306Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.1.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88115,&quot;title&quot;:&quot;WordPress wp-includes/formatting.php make_clickable() PCRE Library Remote DoS&quot;,&quot;osvdb&quot;:&quot;72142&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:27.694Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:27.694Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.0.6&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.0.5&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88116,&quot;title&quot;:&quot;wp-admin/press-this.php - Privilege Escalation&quot;,&quot;cve&quot;:&quot;2011-5270&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;fixed_in&quot;:&quot;3.0.6&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.0.4&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88116,&quot;title&quot;:&quot;wp-admin/press-this.php - Privilege Escalation&quot;,&quot;cve&quot;:&quot;2011-5270&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;fixed_in&quot;:&quot;3.0.6&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.0.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88117,&quot;title&quot;:&quot;SQL injection vulnerability in do_trackbacks() Wordpress function&quot;,&quot;exploitdb&quot;:&quot;15684&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:29.523Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:29.523Z&quot;},{&quot;id&quot;:88118,&quot;title&quot;:&quot;Wordpress 3.0.3 stored XSS IE7,6 NS8.1&quot;,&quot;exploitdb&quot;:&quot;15858&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:29.580Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:29.580Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88116,&quot;title&quot;:&quot;wp-admin/press-this.php - Privilege Escalation&quot;,&quot;cve&quot;:&quot;2011-5270&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;fixed_in&quot;:&quot;3.0.6&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.0.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88119,&quot;title&quot;:&quot;WordPress XML-RPC Interface Access Restriction Bypass&quot;,&quot;osvdb&quot;:&quot;69761&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:29.999Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:29.999Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88116,&quot;title&quot;:&quot;wp-admin/press-this.php - Privilege Escalation&quot;,&quot;cve&quot;:&quot;2011-5270&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;fixed_in&quot;:&quot;3.0.6&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.0.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88120,&quot;title&quot;:&quot;WordPress: Information Disclosure via SQL Injection Attack&quot;,&quot;url&quot;:&quot;http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.465Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.465Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88116,&quot;title&quot;:&quot;wp-admin/press-this.php - Privilege Escalation&quot;,&quot;cve&quot;:&quot;2011-5270&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;fixed_in&quot;:&quot;3.0.6&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;}]}},{&quot;3.0&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88116,&quot;title&quot;:&quot;wp-admin/press-this.php - Privilege Escalation&quot;,&quot;cve&quot;:&quot;2011-5270&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:28.911Z&quot;,&quot;fixed_in&quot;:&quot;3.0.6&quot;},{&quot;id&quot;:88106,&quot;title&quot;:&quot;Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php&quot;,&quot;cve&quot;:&quot;2012-6633&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.753Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88107,&quot;title&quot;:&quot;wp-admin/media-upload.php sensitive information disclosure or bypass&quot;,&quot;cve&quot;:&quot;2012-6634&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.801Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88108,&quot;title&quot;:&quot;wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft&quot;,&quot;cve&quot;:&quot;2012-6635&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:24.846Z&quot;,&quot;fixed_in&quot;:&quot;3.3.3&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0.1&quot;},{&quot;id&quot;:88082,&quot;title&quot;:&quot;Crafted String URL Redirect Restriction Bypass&quot;,&quot;url&quot;:&quot;http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609&quot;,&quot;osvdb&quot;:&quot;97212&quot;,&quot;cve&quot;:&quot;2013-4339&quot;,&quot;secunia&quot;:&quot;54803&quot;,&quot;exploitdb&quot;:&quot;28958&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:21.671Z&quot;,&quot;fixed_in&quot;:&quot;3.6.1&quot;},{&quot;id&quot;:89610,&quot;title&quot;:&quot;testing!!!!123&quot;,&quot;url&quot;:&quot;http://www.example.com&quot;,&quot;osvdb&quot;:&quot;12f345,12345,1234g5&quot;,&quot;cve&quot;:&quot;12345,12345,12345&quot;,&quot;secunia&quot;:&quot;12345,2222,12345,12345&quot;,&quot;exploitdb&quot;:&quot;12345&quot;,&quot;created_at&quot;:&quot;2014-07-29T16:02:58.453Z&quot;,&quot;updated_at&quot;:&quot;2014-07-29T21:03:59.991Z&quot;}]}},{&quot;2.9.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.9.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.9&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88126,&quot;title&quot;:&quot;WordPress 2.9 Failure to Restrict URL Access&quot;,&quot;exploitdb&quot;:&quot;11441&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:32.421Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:32.421Z&quot;},{&quot;id&quot;:88127,&quot;title&quot;:&quot;Wordpress DOS \u003c= 2.9&quot;,&quot;exploitdb&quot;:&quot;11441&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:32.463Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:32.463Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.8.6&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.8.5&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88128,&quot;title&quot;:&quot;WordPress \u003c= 2.8.5 Unrestricted File Upload Arbitrary PHP Code Execution&quot;,&quot;exploitdb&quot;:&quot;10089&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:33.235Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:33.235Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.8.4&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.8.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88129,&quot;title&quot;:&quot;Wordpress \u003c= 2.8.3 Remote Admin Reset Password Vulnerability&quot;,&quot;exploitdb&quot;:&quot;9410&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:34.029Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:34.029Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.8.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.8.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88130,&quot;title&quot;:&quot;Wordpress 2.8.1 (url) Remote Cross Site Scripting Exploit&quot;,&quot;exploitdb&quot;:&quot;9250&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:34.787Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:34.787Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.8&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.7.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.7&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.6.5&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.6.4&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.6.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.6.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.6.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88132,&quot;title&quot;:&quot;Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit&quot;,&quot;exploitdb&quot;:&quot;6421&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:38.068Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:38.068Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.6&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.5.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.5&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88133,&quot;title&quot;:&quot;Wordpress 2.5 Cookie Integrity Protection Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/archive/1/archive/1/491356/100/0/threaded&quot;,&quot;cve&quot;:&quot;2008-1930&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:39.306Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:39.306Z&quot;},{&quot;id&quot;:88111,&quot;title&quot;:&quot;XSS vulnerability in swfupload in WordPress&quot;,&quot;url&quot;:&quot;http://seclists.org/fulldisclosure/2012/Nov/51&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:25.130Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.3.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.3.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.3.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88134,&quot;title&quot;:&quot;Wordpress \u003c= 2.3.1 Charset Remote SQL Injection Vulnerability&quot;,&quot;exploitdb&quot;:&quot;4721&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:40.542Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:40.542Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.2.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.2.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.2.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88135,&quot;title&quot;:&quot;WordPress 2.2 (wp-app.php) Arbitrary File Upload Exploit&quot;,&quot;exploitdb&quot;:&quot;4113&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:42.484Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:42.484Z&quot;},{&quot;id&quot;:88136,&quot;title&quot;:&quot;Wordpress 2.2 (xmlrpc.php) Remote SQL Injection Exploit&quot;,&quot;exploitdb&quot;:&quot;4039&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:42.525Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:42.525Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.1.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88137,&quot;title&quot;:&quot;Wordpress 2.1.3 admin-ajax.php SQL Injection Blind Fishing Exploit&quot;,&quot;exploitdb&quot;:&quot;3960&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:42.948Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:42.948Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.1.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88138,&quot;title&quot;:&quot;WordPress \&quot;year\&quot; Cross-Site Scripting Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/archive/1/archive/1/462374/100/0/threaded&quot;,&quot;secunia&quot;:&quot;24485&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:43.367Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:43.367Z&quot;},{&quot;id&quot;:88139,&quot;title&quot;:&quot;Wordpress 2.1.2 (xmlrpc) Remote SQL Injection Exploit&quot;,&quot;exploitdb&quot;:&quot;3656&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:43.408Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:43.408Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.1.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88140,&quot;title&quot;:&quot;WordPress Command Execution and PHP Injection&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/22797,http://xforce.iss.net/xforce/xfdb/32807&quot;,&quot;cve&quot;:&quot;2007-1277&quot;,&quot;secunia&quot;:&quot;24374&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:43.833Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:43.833Z&quot;,&quot;fixed_in&quot;:&quot;2.1.2&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.11&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.10&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.9&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.8&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.7&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.6&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88141,&quot;title&quot;:&quot;Wordpress \u003c= 2.0.6 wp-trackback.php Remote SQL Injection Exploit&quot;,&quot;exploitdb&quot;:&quot;3109&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:46.450Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:46.450Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.5&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88142,&quot;title&quot;:&quot;Wordpress 2.0.5 Trackback UTF-7 Remote SQL Injection Exploit&quot;,&quot;exploitdb&quot;:&quot;3095&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:46.876Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:46.876Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.4&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88143,&quot;title&quot;:&quot;WordPress 2.0.2 - 2.0.4 Paged Parameter SQL Injection Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/18779&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:47.410Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:47.410Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88143,&quot;title&quot;:&quot;WordPress 2.0.2 - 2.0.4 Paged Parameter SQL Injection Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/18779&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:47.410Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:47.410Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88144,&quot;title&quot;:&quot;WordPress \u003c= 2.0.2 (cache) Remote Shell Injection Exploit&quot;,&quot;exploitdb&quot;:&quot;6&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:48.215Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:48.215Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88143,&quot;title&quot;:&quot;WordPress 2.0.2 - 2.0.4 Paged Parameter SQL Injection Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/18779&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:47.410Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:47.410Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88145,&quot;title&quot;:&quot;Wordpress wp-register.php Multiple Parameter XSS&quot;,&quot;osvdb&quot;:&quot;38577&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;fixed_in&quot;:&quot;2.0.2&quot;},{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;}]}},{&quot;2.0&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88145,&quot;title&quot;:&quot;Wordpress wp-register.php Multiple Parameter XSS&quot;,&quot;osvdb&quot;:&quot;38577&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;fixed_in&quot;:&quot;2.0.2&quot;},{&quot;id&quot;:88131,&quot;title&quot;:&quot;WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability&quot;,&quot;url&quot;:&quot;http://www.securityfocus.com/bid/35584/&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:35.556Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;},{&quot;id&quot;:88121,&quot;title&quot;:&quot;wp-includes/comment.php bypass intended spam restrictions via a crafted URL&quot;,&quot;osvdb&quot;:&quot;104693&quot;,&quot;cve&quot;:&quot;2010-5293&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.842Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88122,&quot;title&quot;:&quot;Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php&quot;,&quot;cve&quot;:&quot;2010-5294&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.889Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88123,&quot;title&quot;:&quot;Cross-site scripting (XSS) in wp-admin/plugins.php&quot;,&quot;cve&quot;:&quot;2010-5295&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.930Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88124,&quot;title&quot;:&quot;wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;cve&quot;:&quot;2010-5296&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:30.971Z&quot;,&quot;fixed_in&quot;:&quot;3.0.2&quot;},{&quot;id&quot;:88125,&quot;title&quot;:&quot;Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action&quot;,&quot;osvdb&quot;:&quot;104691&quot;,&quot;cve&quot;:&quot;2010-5297&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:31.601Z&quot;,&quot;fixed_in&quot;:&quot;3.0&quot;},{&quot;id&quot;:89602,&quot;title&quot;:&quot;this is a test&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:26:16.549Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:26:16.549Z&quot;}]}},{&quot;1.5.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88145,&quot;title&quot;:&quot;Wordpress wp-register.php Multiple Parameter XSS&quot;,&quot;osvdb&quot;:&quot;38577&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;fixed_in&quot;:&quot;2.0.2&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;}]}},{&quot;1.5.1.3&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88145,&quot;title&quot;:&quot;Wordpress wp-register.php Multiple Parameter XSS&quot;,&quot;osvdb&quot;:&quot;38577&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;fixed_in&quot;:&quot;2.0.2&quot;},{&quot;id&quot;:88146,&quot;title&quot;:&quot;Wordpress \u003c= 1.5.1.3 Remote Code Execution eXploit (metasploit)&quot;,&quot;exploitdb&quot;:&quot;1145&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:49.960Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:49.960Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;}]}},{&quot;1.5.1.2&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88145,&quot;title&quot;:&quot;Wordpress wp-register.php Multiple Parameter XSS&quot;,&quot;osvdb&quot;:&quot;38577&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;fixed_in&quot;:&quot;2.0.2&quot;},{&quot;id&quot;:88147,&quot;title&quot;:&quot;Wordpress \u003c= 1.5.1.2 xmlrpc Interface SQL Injection Exploit&quot;,&quot;osvdb&quot;:&quot;17636,17637,17638,17639,17640,17641&quot;,&quot;cve&quot;:&quot;2005-2108&quot;,&quot;secunia&quot;:&quot;15831,15898&quot;,&quot;exploitdb&quot;:&quot;1077&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:50.147Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:50.147Z&quot;,&quot;fixed_in&quot;:&quot;1.5.1.3&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;}]}},{&quot;1.5.1.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88145,&quot;title&quot;:&quot;Wordpress wp-register.php Multiple Parameter XSS&quot;,&quot;osvdb&quot;:&quot;38577&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;fixed_in&quot;:&quot;2.0.2&quot;},{&quot;id&quot;:88148,&quot;title&quot;:&quot;WordPress \u003c= 1.5.1.1 \&quot;add new admin\&quot; SQL Injection Exploit&quot;,&quot;secunia&quot;:&quot;10596&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:50.393Z&quot;,&quot;updated_at&quot;:&quot;2014-07-29T21:23:31.030Z&quot;},{&quot;id&quot;:88149,&quot;title&quot;:&quot;WordPress \u003c= 1.5.1.1 SQL Injection Exploit&quot;,&quot;exploitdb&quot;:&quot;1033&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:50.447Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:50.447Z&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;}]}},{&quot;1.5.1&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88145,&quot;title&quot;:&quot;Wordpress wp-register.php Multiple Parameter XSS&quot;,&quot;osvdb&quot;:&quot;38577&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:48.772Z&quot;,&quot;fixed_in&quot;:&quot;2.0.2&quot;},{&quot;id&quot;:88100,&quot;title&quot;:&quot;XMLRPC Pingback API Internal/External Port Scanning&quot;,&quot;url&quot;:&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.644Z&quot;},{&quot;id&quot;:88101,&quot;title&quot;:&quot;WordPress XMLRPC pingback additional issues&quot;,&quot;url&quot;:&quot;http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:22.684Z&quot;}]}},{&quot;1.5&quot;:{&quot;vulnerabilities&quot;:[{&quot;id&quot;:88150,&quot;title&quot;:&quot;WordPress wp-trackback.php tb_id Parameter SQL Injection&quot;,&quot;osvdb&quot;:&quot;16701,16702,16703&quot;,&quot;cve&quot;:&quot;2005-1687&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:50.774Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:50.774Z&quot;,&quot;fixed_in&quot;:&quot;1.5.1&quot;},{&quot;id&quot;:88151,&quot;title&quot;:&quot;WordPress post.php p Parameter XSS&quot;,&quot;osvdb&quot;:&quot;16702,16701,16703&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:50.819Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:50.819Z&quot;,&quot;fixed_in&quot;:&quot;1.5.1&quot;},{&quot;id&quot;:88152,&quot;title&quot;:&quot;WordPress Multiple Script Direct Request Path Disclosure&quot;,&quot;osvdb&quot;:&quot;16703,16701,16702&quot;,&quot;cve&quot;:&quot;2005-1688&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:50.865Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:50.865Z&quot;,&quot;fixed_in&quot;:&quot;1.5.1&quot;},{&quot;id&quot;:88153,&quot;title&quot;:&quot;WordPress Cross-Site Scripting and SQL Injection Vulnerabilities&quot;,&quot;osvdb&quot;:&quot;16478&quot;,&quot;secunia&quot;:&quot;15324&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:50.924Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:50.924Z&quot;,&quot;fixed_in&quot;:&quot;1.5.1&quot;},{&quot;id&quot;:88154,&quot;title&quot;:&quot;WordPress template-functions-post.php Multiple Field XSS&quot;,&quot;osvdb&quot;:&quot;15643&quot;,&quot;cve&quot;:&quot;2005-1102&quot;,&quot;created_at&quot;:&quot;2014-07-15T17:16:50.999Z&quot;,&quot;updated_at&quot;:&quot;2014-07-15T17:16:50.999Z&quot;}]}}]</div></pre></div></td>
</tr>
</table>
</div>
</div>
</div>
<a href="#jump-to-line" rel="facebox[.linejump]" data-hotkey="l" style="display:none">Jump to Line</a>
<div id="jump-to-line" style="display:none">
<form accept-charset="UTF-8" class="js-jump-to-line-form">
<input class="linejump-input js-jump-to-line-field" type="text" placeholder="Jump to line&hellip;" autofocus>
<button type="submit" class="button">Go</button>
</form>
</div>
</div>
</div><!-- /.repo-container -->
<div class="modal-backdrop"></div>
</div><!-- /.container -->
</div><!-- /.site -->
</div><!-- /.wrapper -->
<div class="container">
<div class="site-footer">
<ul class="site-footer-links right">
<li><a href="https://status.github.com/">Status</a></li>
<li><a href="http://developer.github.com">API</a></li>
<li><a href="http://training.github.com">Training</a></li>
<li><a href="http://shop.github.com">Shop</a></li>
<li><a href="/blog">Blog</a></li>
<li><a href="/about">About</a></li>
</ul>
<a href="/" aria-label="Homepage">
<span class="mega-octicon octicon-mark-github" title="GitHub"></span>
</a>
<ul class="site-footer-links">
<li>&copy; 2014 <span title="0.03074s from github-fe130-cp1-prd.iad.github.net">GitHub</span>, Inc.</li>
<li><a href="/site/terms">Terms</a></li>
<li><a href="/site/privacy">Privacy</a></li>
<li><a href="/security">Security</a></li>
<li><a href="/contact">Contact</a></li>
</ul>
</div><!-- /.site-footer -->
</div><!-- /.container -->
<div class="fullscreen-overlay js-fullscreen-overlay" id="fullscreen_overlay">
<div class="fullscreen-container js-suggester-container">
<div class="textarea-wrap">
<textarea name="fullscreen-contents" id="fullscreen-contents" class="fullscreen-contents js-fullscreen-contents js-suggester-field" placeholder=""></textarea>
</div>
</div>
<div class="fullscreen-sidebar">
<a href="#" class="exit-fullscreen js-exit-fullscreen tooltipped tooltipped-w" aria-label="Exit Zen Mode">
<span class="mega-octicon octicon-screen-normal"></span>
</a>
<a href="#" class="theme-switcher js-theme-switcher tooltipped tooltipped-w"
aria-label="Switch themes">
<span class="octicon octicon-color-mode"></span>
</a>
</div>
</div>
<div id="ajax-error-message" class="flash flash-error">
<span class="octicon octicon-alert"></span>
<a href="#" class="octicon octicon-x close js-ajax-error-dismiss" aria-label="Dismiss error"></a>
Something went wrong with that request. Please try again.
</div>
<script crossorigin="anonymous" src="https://assets-cdn.github.com/assets/frameworks-e4dc2473554b94cdf2908eac37f60d9d484f612d.js" type="text/javascript"></script>
<script async="async" crossorigin="anonymous" src="https://assets-cdn.github.com/assets/github-71c62e998886d9868432b321caf16c3b74963c29.js" type="text/javascript"></script>
<script async src="https://www.google-analytics.com/analytics.js"></script>
</body>
</html>