Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 27 May 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Geomywp
Geomywp geo My Wordpress |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:geomywp:geo_my_wordpress:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Geomywp
Geomywp geo My Wordpress |
Mon, 19 Aug 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Geo My Wp
Geo My Wp geo My Wp |
|
| CPEs | cpe:2.3:a:geo_my_wp:geo_my_wp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Geo My Wp
Geo My Wp geo My Wp |
|
| Metrics |
cvssV3_1
|
Mon, 19 Aug 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The GEO my WP WordPress plugin before 4.5.0.2 does not prevent unauthenticated attackers from including arbitrary files in PHP's execution context, which leads to Remote Code Execution. | |
| Title | GEO my WordPress < 4.4.0.2 - Unauthenticated RCE via LFI | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-19T15:29:05.964Z
Reserved: 2024-06-25T16:37:48.797Z
Link: CVE-2024-6330
Updated: 2024-08-19T15:29:00.538Z
Status : Analyzed
Published: 2024-08-19T06:15:05.690
Modified: 2025-05-27T21:06:37.533
Link: CVE-2024-6330
No data.
OpenCVE Enrichment
No data.