CVE-2014-8491

The Grand Flagallery plugin before 4.25 for WordPress allows remote attackers to obtain the installation path via a request to (1) flagallery-skins/banner_widget_default/gallery.php or (2) flash-album-gallery/skins/banner_widget_default/gallery.php.
References
Link Resource
https://g0blin.co.uk/cve-2014-8491/ Exploit Third Party Advisory
https://wpvulndb.com/vulnerabilities/8238 Third Party Advisory
https://g0blin.co.uk/cve-2014-8491/ Exploit Third Party Advisory
https://wpvulndb.com/vulnerabilities/8238 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () https://g0blin.co.uk/cve-2014-8491/ - Exploit, Third Party Advisory () https://g0blin.co.uk/cve-2014-8491/ - Exploit, Third Party Advisory
References () https://wpvulndb.com/vulnerabilities/8238 - Third Party Advisory () https://wpvulndb.com/vulnerabilities/8238 - Third Party Advisory

Information

Published : 2017-10-18 14:29

Updated : 2024-11-21 02:19


NVD link : CVE-2014-8491

Mitre link : CVE-2014-8491

CVE.ORG link : CVE-2014-8491


JSON object : View

Products Affected

codeasily

  • grand_flagallery
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor