Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-1010

Опубликовано: 07 фев. 2012
Источник: nvd
CVSS2: 7.5
EPSS Средний

Описание

Unrestricted file upload vulnerability in actions.php in the AllWebMenus plugin before 1.1.8 for WordPress allows remote attackers to execute arbitrary PHP code by uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:likno:allwebmenus_plugin:*:*:*:*:*:*:*:*
Версия до 1.1.7 (включая)
cpe:2.3:a:likno:allwebmenus_plugin:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.20:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.21:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.22:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.23:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.0.24:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:likno:allwebmenus_plugin:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

EPSS

Процентиль: 94%
0.13443
Средний

7.5 High

CVSS2

Дефекты

CWE-20

Связанные уязвимости

github
около 3 лет назад

Unrestricted file upload vulnerability in actions.php in the AllWebMenus plugin before 1.1.8 for WordPress allows remote attackers to execute arbitrary PHP code by uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.

EPSS

Процентиль: 94%
0.13443
Средний

7.5 High

CVSS2

Дефекты

CWE-20