Description
|
|
Multiple vulnerabilities were identified in WordPress, which could be exploited by attackers to disclose sensitive information or execute arbitrary scripting code.
The first is due to input validation errors in the "wp-comments-post.php" script that does not properly validate the "Name" and "Website" parameters, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second issue is due to input validation errors in various scripts that do not properly handle empty parameters, which could be exploited by attackers to determine the installation path.
|