Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2007-1409
WordPress allows remote attackers to obtain sensitive information via a direct request for wp-admin/admin-functions.php, which reveals the path in an error message.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.004
EPSS Ranking
60.6%
CVSS Severity
CVSS v2 Score
5.0
References
http://secunia.com/advisories/24566
http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
http://www.securityfocus.com/archive/1/462230/100/0/threaded
http://www.securityfocus.com/archive/1/462249/100/0/threaded
https://exchange.xforce.ibmcloud.com/vulnerabilities/32881
http://secunia.com/advisories/24566
http://www.gentoo.org/security/en/glsa/glsa-200703-23.xml
http://www.securityfocus.com/archive/1/462230/100/0/threaded
http://www.securityfocus.com/archive/1/462249/100/0/threaded
https://exchange.xforce.ibmcloud.com/vulnerabilities/32881
Products affected by CVE-2007-1409
Wordpress
»
Wordpress
»
Version:
2.0
cpe:2.3:a:wordpress:wordpress:2.0
Wordpress
»
Wordpress
»
Version:
2.0.1
cpe:2.3:a:wordpress:wordpress:2.0.1
Wordpress
»
Wordpress
»
Version:
2.0.2
cpe:2.3:a:wordpress:wordpress:2.0.2
Wordpress
»
Wordpress
»
Version:
2.0.3
cpe:2.3:a:wordpress:wordpress:2.0.3
Wordpress
»
Wordpress
»
Version:
2.0.4
cpe:2.3:a:wordpress:wordpress:2.0.4
Wordpress
»
Wordpress
»
Version:
2.0.5
cpe:2.3:a:wordpress:wordpress:2.0.5
Wordpress
»
Wordpress
»
Version:
2.0.6
cpe:2.3:a:wordpress:wordpress:2.0.6
Wordpress
»
Wordpress
»
Version:
2.0.7
cpe:2.3:a:wordpress:wordpress:2.0.7
Wordpress
»
Wordpress
»
Version:
2.1
cpe:2.3:a:wordpress:wordpress:2.1
Wordpress
»
Wordpress
»
Version:
2.1.1
cpe:2.3:a:wordpress:wordpress:2.1.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved