WordPress 'wp-admin' Multiple Vulnerabilities - Aug09

Summary
The host is running WordPress and is prone to multiple vulnerabilities.
Impact
Attackers can exploit this issue by sending malicious request to several scripts in the wp-admin directory to gain access to administrative functions which may allow them to obtain sensitive information or elevate privileges. Impact Level: System/Application
Solution
Update to Version 2.8.3 http://wordpress.org/download/
Insight
- Application fails to properly sanitize user supplied input via a direct request to admin-footer.php, edit-category-form.php, edit-form-advanced.php, edit-form-comment.php, edit-link-category-form.php, edit-link-form.php, edit-page-form.php, and edit-tag-form.php in wp-admin/. - Application fails to check capabilities for certain actions, it can be exploited to cause unauthorized edits or additions via a direct request to edit-comments.php, edit-pages.php, import.php, edit-category-form.php, edit-link-category-form.php, edit-tag-form.php, export.php, link-add.php or edit.php in wp-admin/.
Affected
WordPress version prior to 2.8.3 on all running platform.
References