5
CVSSv2

CVE-2012-4915

Published: 29/05/2014 Updated: 29/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in the Google Doc Embedder plugin prior to 2.5.4 for WordPress allows remote malicious users to read arbitrary files via a .. (dot dot) in the file parameter to libs/pdf.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

davistribe google_doc_embedder 2.5.2

davistribe google_doc_embedder 2.5.1

davistribe google_doc_embedder 2.4.1

davistribe google_doc_embedder 2.4

davistribe google_doc_embedder 2.5

davistribe google_doc_embedder 2.4.6

davistribe google_doc_embedder 2.3

davistribe google_doc_embedder 2.2.3

davistribe google_doc_embedder 2.4.5

davistribe google_doc_embedder 2.4.4

davistribe google_doc_embedder 2.2.2

davistribe google_doc_embedder 2.2.1

davistribe google_doc_embedder 2.2

davistribe google_doc_embedder

davistribe google_doc_embedder 2.4.3

davistribe google_doc_embedder 2.4.2

davistribe google_doc_embedder 2.1

davistribe google_doc_embedder 2.0

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' require 'rbmysql' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking inclu ...

Github Repositories

Drills through git commit histories to find vulnerability IDs in change logs.

git_vul_driller Crawl the logs of a git repo and find commits matching a regex Getting started Edit config_metasploityaml as needed Edit config_edbyaml as needed Set up your environment (Hint: Use a virtual env) $ conda create -n myenv --python=38 $ conda activate myenv $ pip install -r requirementstxt $ python setuppy install Run