Vulnerabilities protected by our Directory Traversal firewall rule

1,852,987
Attacks Blocked in Past 24 Hours

Showing 61-80 of 279 Vulnerabilities

Title CVE ID CVSS Vector Date
Swim Team < 1.45.1085 - Directory Traversal CVE-2015-5471 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N July 8, 2015
PayPal Currency Converter BASIC for WooCommerce <= 1.3 - Path Traversal to Arbitrary File Read CVE-2015-5065 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N June 10, 2015
Easy2map-photos <= 1.0.9 - Path Traversal CVE-2015-4617 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N June 8, 2015
Aspose Cloud eBook Generator <= 1.0 - Directory Traversal 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N March 27, 2015
Tom M8te <= 1.5.3 - Directory Traversal CVE-2014-5187 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N September 27, 2014
Last.fm Rotation <= 1.0 - Directory Traversal CVE-2014-5181 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N May 28, 2014
Ripe HD FLV <= 1.1 - Full Path Disclosure 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N January 20, 2013
Eshop Magic < 0.2 - Arbitrary File Read 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N October 12, 2012
Wp-ImageZoom < 1.0.5 - Directory Traversal 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N June 18, 2012
myEASYbackup < 1.0.9 - Directory Traversal CVE-2012-0898 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N January 16, 2012
DMSGuestbook <= 1.8.0 - Directory Traversal CVE-2008-0615 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N February 2, 2008
secure-files <= 1.1 - Directory Traversal CVE-2005-10002 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N October 3, 2005
WP Recipe Maker <= 9.1.0 - Directory Traversal CVE-2024-0380 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N January 17, 2024
WordPress Core < 6.2.1 - Directory Traversal CVE-2023-2745 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N May 16, 2023
Product Configurator for WooCommerce <= 1.2.31 - Arbitrary File Deletion CVE-2022-1953 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L June 1, 2022
BP Group Documents <= 1.2.1 - Path Traversal 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L October 4, 2013
Backup and Restore plugin – WordPress <= 1.0.3 - Authenticated (Admin+) Arbitrary File Deletion 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H November 8, 2021
Skippy WP-DB Backup (Legacy Plugin) <= 1.7 - Authenticated (Admin+) Directory Traversal CVE-2006-4208 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N August 14, 2006
Urban City (All Versions) - Arbitrary File Download 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N September 8, 2014
Remote Content Shortcode <= 1.5 - Authenticated(Contributor+) Local File Inclusion via shortcode CVE-2023-45652 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L October 12, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation