Vulnerability Details : CVE-2014-100009
The Joomlaskin JS Multi Hotel (aka JS MultiHotel and Js-Multi-Hotel) plugin 2.2.1 and earlier for WordPress allows remote attackers to obtain the installation path via a request to (1) functions.php, (2) myCalendar.php, (3) refreshDate.php, (4) show_image.php, (5) widget.php, (6) phpthumb/GdThumb.inc.php, or (7) phpthumb/thumb_plugins/gd_reflection.inc.php in includes/.
Vulnerability category: Information leak
Products affected by CVE-2014-100009
- cpe:2.3:a:joomlaskin:js_multi_hotel:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-100009
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-100009
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-100009
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-100009
-
http://websecurity.com.ua/7087/
Численні уразливості в Js-Multi-Hotel для WordPress - Websecurity - Веб безпекаExploit
-
http://packetstormsecurity.com/files/125959
WordPress Js-Multi-Hotel 2.2.1 XSS / DoS / Disclosure / Abuse ≈ Packet StormExploit
Jump to