Directory traversal vulnerability in zM Ajax Login & Register plugin allows remote attackers to execute arbitrary php files
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
0day.today | WordPress zM Ajax Login & Register Plugin 1.0.9 Local File Inclusion Vulnerability | 4 Jun 201500:00 | – | zdt |
NVD | CVE-2015-4153 | 10 Jun 201518:59 | – | nvd |
Patchstack | WordPress ZM Ajax Login & Register Plugin 1.0.9 - Local File Inclusion | 4 Jun 201500:00 | – | patchstack |
Cvelist | CVE-2015-4153 | 10 Jun 201518:00 | – | cvelist |
exploitpack | WordPress Plugin zM Ajax Login Register 1.0.9 - Local File Inclusion | 4 Jun 201500:00 | – | exploitpack |
Prion | Directory traversal | 10 Jun 201518:59 | – | prion |
Packet Storm | WordPress zM Ajax Login Register 1.0.9 Local File Inclusion | 5 Jun 201500:00 | – | packetstorm |
securityvulns | CVE-2015-4153 - WordPress zM Ajax Login & Register Plugin [Local File Inclusion] | 8 Jun 201500:00 | – | securityvulns |
securityvulns | Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl) | 8 Jun 201500:00 | – | securityvulns |
Exploit DB | WordPress Plugin zM Ajax Login & Register 1.0.9 - Local File Inclusion | 4 Jun 201500:00 | – | exploitdb |
Source | Link |
---|---|
exploit-db | www.exploit-db.com/exploits/37200/ |
wordpress | www.wordpress.org/plugins/zm-ajax-login-register/changelog/ |
packetstormsecurity | www.packetstormsecurity.com/files/132172/WordPress-zM-Ajax-Login-Register-1.0.9-Local-File-Inclusion.html |
securityfocus | www.securityfocus.com/archive/1/535682/100/0/threaded |
security | www.security.gentoo.org/glsa/201512-10 |
securityfocus | www.securityfocus.com/bid/75041 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo