5
CVSSv2

CVE-2012-4915

Published: 29/05/2014 Updated: 29/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in the Google Doc Embedder plugin prior to 2.5.4 for WordPress allows remote malicious users to read arbitrary files via a .. (dot dot) in the file parameter to libs/pdf.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

davistribe google doc embedder

davistribe google doc embedder 2.0

davistribe google doc embedder 2.1

davistribe google doc embedder 2.2

davistribe google doc embedder 2.2.1

davistribe google doc embedder 2.2.2

davistribe google doc embedder 2.2.3

davistribe google doc embedder 2.3

davistribe google doc embedder 2.4

davistribe google doc embedder 2.4.1

davistribe google doc embedder 2.4.2

davistribe google doc embedder 2.4.3

davistribe google doc embedder 2.4.4

davistribe google doc embedder 2.4.5

davistribe google doc embedder 2.4.6

davistribe google doc embedder 2.5

davistribe google doc embedder 2.5.1

davistribe google doc embedder 2.5.2

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' require 'rbmysql' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking inclu ...

Github Repositories

Drills through git commit histories to find vulnerability IDs in change logs.

git_vul_driller Crawl the logs of a git repo and find commits matching a regex Getting started Edit config_metasploityaml as needed Edit config_edbyaml as needed Set up your environment (Hint: Use a virtual env) $ conda create -n myenv --python=38 $ conda activate myenv $ pip install -r requirementstxt $ python setuppy install Run