Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-5187

EPSS 0.23% · P46
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-5187

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in the Tom M8te (tom-m8te) plugin 1.5.3 for WordPress allows remote attackers to read arbitrary files via the file parameter to tom-download-file.php.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress Tom M8te插件目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Tom M8te(tom-m8te)是其中的一个用于开发插件或主题框架的插件。 WordPress的Tom M8te(tom-m8te)插件1.5.3版本中存在目录遍历漏洞,该漏洞源于tom-download-file.php脚本未充分过滤‘file’参数。远程攻击者可利用该漏洞读取任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-5187

#POC DescriptionSource LinkShenlong Link
1Directory traversal vulnerability in the Tom M8te (tom-m8te) plugin 1.5.3 for WordPress allows remote attackers to read arbitrary files via the file parameter to tom-download-file.php. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-5187.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-5187

Please Login to view more intelligence information

Same Patch Batch · n/a · 2014-08-06 · 20 CVEs total

CVE-2014-5185WordPress Quartz插件SQL注入漏洞
CVE-2014-5179Drupal freelinking 权限许可和访问控制漏洞
CVE-2014-5178EFS Software Web Server 跨站脚本漏洞
CVE-2014-5090Status2k 代码注入漏洞
CVE-2014-5089Status2k SQL注入漏洞
CVE-2014-5088Status2K 跨站脚本漏洞
CVE-2014-5082多款Sphider产品SQL注入漏洞
CVE-2014-3560Samba NetBIOS name services daemon 安全漏洞漏洞
CVE-2013-4159Novell openSUSE ctdb 安全漏洞
CVE-2014-5186WordPress All Video Gallery插件SQL注入漏洞
CVE-2012-6653WordPress All Video Gallery插件安全漏洞
CVE-2014-5184WordPress stripShow插件SQL注入漏洞
CVE-2014-5183WordPress Simple Retail Menus插件SQL注入漏洞
CVE-2014-5182WordPress yawpp插件SQL注入漏洞
CVE-2014-5181WordPress Last.fm Rotation插件目录遍历漏洞
CVE-2014-5180WordPress HDW Player插件SQL注入漏洞
CVE-2014-3559Red Hat Enterprise Virtualization Manager 权限许可和访问控制问题漏洞
CVE-2014-3434Symantec Endpoint Protection Client和Small Business Edition SEP 缓冲区溢出漏洞
CVE-2014-0479reportbug 代码注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-5187

No comments yet


Leave a comment