[Forgot Password]
Login  Register Subscribe

23631

 
 

115036

 
 

95906

 
 

909

 
 

77949

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-1010

Date: (C)2012-02-07   (M)2017-08-29
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Unrestricted file upload vulnerability in actions.php in the AllWebMenus plugin before 1.1.8 for WordPress allows remote attackers to execute arbitrary PHP code by uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.

Reference:
EXPLOIT-DB-18407
http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html
SECUNIA-47659
BID-51615
allwebmenus-actions-file-upload(72640)
http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog/

CWE    1
CWE-20

© 2013 SecPod Technologies