diff --git a/cves/2015/CVE-2015-4414.yaml b/cves/2015/CVE-2015-4414.yaml index 59c92e4279..4a70bec9ca 100644 --- a/cves/2015/CVE-2015-4414.yaml +++ b/cves/2015/CVE-2015-4414.yaml @@ -1,13 +1,13 @@ id: CVE-2015-4414 info: - name: WordPress Plugin SE HTML5 Album Audio Player 1.1.0 - Directory Traversal + name: WordPress SE HTML5 Album Audio Player 1.1.0 - Directory Traversal author: daffainfo severity: high - description: Directory traversal vulnerability in download_audio.php in the SE HTML5 Album Audio Player (se-html5-album-audio-player) plugin 1.1.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. + description: WordPress SE HTML5 Album Audio Player 1.1.0 contains a directory traversal vulnerability in download_audio.php that allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. reference: - https://www.exploit-db.com/exploits/37274 - - https://www.cvedetails.com/cve/CVE-2015-4414 + - https://nvd.nist.gov/vuln/detail/CVE-2015-4414 - https://www.exploit-db.com/exploits/37274/ - http://packetstormsecurity.com/files/132266/WordPress-SE-HTML5-Album-Audio-Player-1.1.0-Directory-Traversal.html classification: @@ -29,3 +29,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/06/08