The remote server is hosting an outdated installation of WordPress that is vulnerable to multiple attack vectors.
Versions of WordPress prior to 3.3.2 are susceptible to the following vulnerabilities : - A flaw exists in the SWFUpload module that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'buttonText' parameter upon submission to the 'wp-includes/js/swfupload/swfupload.swf' script. This may allow an attacker to create a specially crafted request that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. (CVE-2012-2399) - An unspecified remote issue exists related to the 'wp-includes/js/swfobject.js script'. No further details have been provided. (CVE-2012-2400) - A flaw exists in the 'security.allowDomain()' method, which allows any domain to access objects and variables within Flash content. By embedding the applet on a page, a context-dependent attacker can disclose various information including CSRF tokens if a user is tricked into interacting with the applet. (CVE-2012-2401, CVE-2012-3415) - A flaw exists related to the 'wp-admin/plugins.php' script that may allow an attacker to cause a network-wide plugin deactivation. (CVE-2012-2402) - Flaws exist that make it easier to perform a remote cross-site scripting (XSS) attack. These flaws exist because the application does not validate certain unspecified input upon submission to both the 'wp-includes/formatting.php' and 'wp-comments-post.php' scripts. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. (CVE-2012-2403, CVE-2012-2404)