Логотип exploitDog
bind:CVE-2015-10136
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-10136

Количество 2

Количество 2

nvd логотип

CVE-2015-10136

7 месяцев назад

The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-2rvr-53rv-hrfq

7 месяцев назад

The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2015-10136

The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

CVSS3: 7.5
49%
Средний
7 месяцев назад
github логотип
GHSA-2rvr-53rv-hrfq

The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

CVSS3: 7.5
49%
Средний
7 месяцев назад

Уязвимостей на страницу