We have collected the most relevant information on Wordpress Audio Player Exploit. Open the URLs, which are collected below, and you will find all the info you are interested in.
WordPress Plugin Audio Player ... - Exploit Database
https://www.exploit-db.com/exploits/38300
WordPress Plugin Audio Player - 'playerID' Cross-Site Scripting. CVE-2013-1464CVE-89963 . webapps exploit for PHP platform
WordPress Plugin SE HTML5 Album Audio Player 1.1.0 ...
https://www.exploit-db.com/exploits/37274
Vulnerability: The se-html5-album-audio-player v1.1.0 plugin for wordpress has a remote file download vulnerability. The download_audio.php file does not correctly check the file path, it only attempts to check if the path is in /wp-content/uploads which …
WordPress Plugin WonderPlugin Audio Player 2.0 - Blind SQL ...
https://www.exploit-db.com/exploits/36086
WordPress Plugin WonderPlugin Audio Player 2.0 - Blind SQL Injection / Cross-Site Scripting. CVE-118511CVE-118510CVE-118509CVE-118508CVE-2015-2218CVE-2015-2199 . webapps exploit for PHP platform
WordPress Plugin ZoomSounds-WordPress Wave Audio Player ...
https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-zoomsounds-wordpress-wave-audio-player-with-playlist-arbitrary-file-upload-2-0/
Description. WordPress Plugin ZoomSounds-WordPress Wave Audio Player with Playlist is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or …
WordPress Audio Player SWF Cross Site ... - Packet Storm
https://packetstormsecurity.com/files/120129/WordPress-Audio-Player-SWF-Cross-Site-Scripting.html
WordPress Audio Player versions prior to 2.0.4.6 suffer from a cross site scripting vulnerability in player.swf. tags | exploit , xss advisories | CVE-2013-1464
Now you know Wordpress Audio Player Exploit
Now that you know Wordpress Audio Player Exploit, we suggest that you familiarize yourself with information on similar questions.