Lucene search

K

wp-instance-rename <= 1.0 - Arbitrary File Download

🗓️ 23 Jun 2015 00:00:00Reported by ethicalhack3rType 
wpvulndb
 wpvulndb
🔗 wpscan.com👁 7 Views

The wp-instance-rename WordPress plugin has an Arbitrary File Download vulnerability

Show more
Related
Detection
Refs
ReporterTitlePublishedViews
Family
NVD
CVE-2015-4703
12 Jan 201619:59
nvd
Packet Storm
WordPress WP-Instance-Rename 1.0 File Download
26 Jun 201500:00
packetstorm
Prion
Path traversal
12 Jan 201619:59
prion
Cvelist
CVE-2015-4703
12 Jan 201619:00
cvelist
CVE
CVE-2015-4703
12 Jan 201619:59
cve
wpexploit
wp-instance-rename <= 1.0 - Arbitrary File Download
23 Jun 201500:00
wpexploit
Patchstack
WordPress Rename Plugin <= 1.0 - Absolute Path Traversal
22 Jun 201500:00
patchstack
OpenVAS
WordPress Multiple Plugins / Themes Directory Traversal / File Download Vulnerability (HTTP)
20 Nov 202000:00
openvas
Vulners

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Jun 2015 00:00Current
0.8Low risk
Vulners AI Score0.8
EPSS0.006
7
.json
Report