![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2015-4153 |
Description: | Directory traversal vulnerability in the zM Ajax Login & Register plugin before 1.1.0 for WordPress allows remote attackers to include and execute arbitrary php files via a relative path in the template parameter in a load_template action to wp-admin/admin-ajax.php. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-4153 BugTraq ID: 75041 http://www.securityfocus.com/bid/75041 Bugtraq: 20150604 CVE-2015-4153 - WordPress zM Ajax Login & Register Plugin [Local File Inclusion] (Google Search) http://www.securityfocus.com/archive/1/535682/100/0/threaded https://www.exploit-db.com/exploits/37200/ https://security.gentoo.org/glsa/201512-10 http://packetstormsecurity.com/files/132172/WordPress-zM-Ajax-Login-Register-1.0.9-Local-File-Inclusion.html |