Логотип exploitDog
bind:CVE-2015-10134
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-10134

Количество 2

Количество 2

nvd логотип

CVE-2015-10134

7 месяцев назад

The Simple Backup plugin for WordPress is vulnerable to Arbitrary File Download in versions up to, and including, 2.7.10. via the download_backup_file function. This is due to a lack of capability checks and file type validation. This makes it possible for attackers to download sensitive files such as the wp-config.php file from the affected site.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-6rrr-pqjc-jxwv

7 месяцев назад

The Simple Backup plugin for WordPress is vulnerable to Arbitrary File Download in versions up to, and including, 2.7.10. via the download_backup_file function. This is due to a lack of capability checks and file type validation. This makes it possible for attackers to download sensitive files such as the wp-config.php file from the affected site.

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2015-10134

The Simple Backup plugin for WordPress is vulnerable to Arbitrary File Download in versions up to, and including, 2.7.10. via the download_backup_file function. This is due to a lack of capability checks and file type validation. This makes it possible for attackers to download sensitive files such as the wp-config.php file from the affected site.

CVSS3: 7.5
50%
Средний
7 месяцев назад
github логотип
GHSA-6rrr-pqjc-jxwv

The Simple Backup plugin for WordPress is vulnerable to Arbitrary File Download in versions up to, and including, 2.7.10. via the download_backup_file function. This is due to a lack of capability checks and file type validation. This makes it possible for attackers to download sensitive files such as the wp-config.php file from the affected site.

CVSS3: 7.5
50%
Средний
7 месяцев назад

Уязвимостей на страницу