2017年1月13日 评论 354 1049字阅读3分29秒





1、Remote code execution (RCE) in PHPMailer – No specific issue appears to affect WordPress or any of the major plugins we investigated but, out of an abundance of caution, we updated PHPMailer in this release.

2、The REST API exposed user data for all users who had authored a post of a public post type. WordPress 4.7.1 limits this to only post types which have specified that they should be shown within the REST API.

3、Cross-site scripting (XSS) via the plugin name or version header on update-core.php.

4、Cross-site request forgery (CSRF) bypass via uploading a Flash file.

5、Cross-site scripting (XSS) via theme name fallback.

6、Post via email checks mail.example.com if default settings aren't changed.

7、A cross-site request forgery (CSRF) was discovered in the accessibility mode of widget editing.

8、Weak cryptographic security for multisite activation key.


  • 我的微信
  • 分享宝塔面板建站技术交流等!
  • weinxin
  • 微信公众号
  • 关注本博公众号
  • weinxin
  • 版权声明: 发表于 2017年1月13日
  • 转载注明:https://www.daniao.org/917.html


:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: