Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-5471
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-12 Jan, 2016 | 19:59
Updated At-12 Apr, 2025 | 10:46

Absolute path traversal vulnerability in include/user/download.php in the Swim Team plugin 1.44.10777 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.05.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

swim_team_project
swim_team_project
>>swim_team>>1.44.10777
cpe:2.3:a:swim_team_project:swim_team:1.44.10777:*:*:*:*:wordpress:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://michaelwalsh.org/blog/2015/07/wp-swimteam-v1-45-beta-3-now-available/cve@mitre.org
N/A
http://packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.htmlcve@mitre.org
Exploit
http://www.securityfocus.com/bid/75600cve@mitre.org
N/A
http://www.vapid.dhs.org/advisory.php?v=134cve@mitre.org
Exploit
https://wordpress.org/support/topic/security-vulnerability-6cve@mitre.org
Patch
Vendor Advisory
https://wpvulndb.com/vulnerabilities/8071cve@mitre.org
Exploit
http://michaelwalsh.org/blog/2015/07/wp-swimteam-v1-45-beta-3-now-available/af854a3a-2127-422b-91ae-364da2661108
N/A
http://packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/bid/75600af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vapid.dhs.org/advisory.php?v=134af854a3a-2127-422b-91ae-364da2661108
Exploit
https://wordpress.org/support/topic/security-vulnerability-6af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
https://wpvulndb.com/vulnerabilities/8071af854a3a-2127-422b-91ae-364da2661108
Exploit
Change History
0Changes found

Details not found