Language:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924546
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
https://security-tracker.debian.org/tracker/source-package/wordpress
https://packages.debian.org/source/stretch/wordpress
Severity: Critical
ID: 136373
File Name: debian_DSA-4677.nasl
Version: 1.5
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 5/7/2020
Updated: 3/13/2024
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2019-20041
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:wordpress, cpe:/o:debian:debian_linux:10.0, cpe:/o:debian:debian_linux:9.0
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/6/2020
Vulnerability Publication Date: 3/14/2019
CVE: CVE-2019-16217, CVE-2019-16218, CVE-2019-16219, CVE-2019-16220, CVE-2019-16221, CVE-2019-16222, CVE-2019-16223, CVE-2019-16780, CVE-2019-16781, CVE-2019-17669, CVE-2019-17671, CVE-2019-17672, CVE-2019-17673, CVE-2019-17674, CVE-2019-17675, CVE-2019-20041, CVE-2019-20042, CVE-2019-20043, CVE-2019-9787, CVE-2020-11025, CVE-2020-11026, CVE-2020-11027, CVE-2020-11028, CVE-2020-11029, CVE-2020-11030
DSA: 4677
IAVA: 2020-A-0191-S