The wp-instance-rename WordPress plugin has an Arbitrary File Download vulnerability
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
NVD | CVE-2015-4703 | 12 Jan 201619:59 | – | nvd |
Packet Storm | WordPress WP-Instance-Rename 1.0 File Download | 26 Jun 201500:00 | – | packetstorm |
Prion | Path traversal | 12 Jan 201619:59 | – | prion |
Cvelist | CVE-2015-4703 | 12 Jan 201619:00 | – | cvelist |
CVE | CVE-2015-4703 | 12 Jan 201619:59 | – | cve |
wpexploit | wp-instance-rename <= 1.0 - Arbitrary File Download | 23 Jun 201500:00 | – | wpexploit |
Patchstack | WordPress Rename Plugin <= 1.0 - Absolute Path Traversal | 22 Jun 201500:00 | – | patchstack |
OpenVAS | WordPress Multiple Plugins / Themes Directory Traversal / File Download Vulnerability (HTTP) | 20 Nov 202000:00 | – | openvas |
Source | Link |
---|---|
openwall | www.openwall.com/lists/oss-security/2015/06/23/5 |
packetstormsecurity | www.packetstormsecurity.com/files/132460/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo