1 results (0.007 seconds)

CVSS: 9.8EPSS: 10%CPEs: 1EXPL: 5

Unrestricted file upload vulnerability in upload.php in the Powerplay Gallery plugin 3.3 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in *_uploadfolder/big/. Vulnerabilidad de subida de archivo no restringido en upload.php en el plugin Powerplay Gallery 3.3 para WordPress, permite a atacantes remotos ejecutar código arbitrario subiendo un archivo con una extensión ejecutable, accediendo entonces a él a través de una solicitud directa al archivo en *_uploadfolder/big/. • http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html http://seclists.org/fulldisclosure/2015/Jul/64 http://www.openwall.com/lists/oss-security/2015/07/20/1 http://www.openwall.com/lists/oss-security/2015/07/27/8 http://www.vapid.dhs.org/advisory.php?v=132 • CWE-434: Unrestricted Upload of File with Dangerous Type •