Unrestricted file upload vulnerability in upload.php in the Giulio Ganci Wp Downloads Manager module 0.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension via the upfile parameter, then accessing it via a direct request to the file in wp-content/plugins/downloads-manager/upload/.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T09:37:26.953Z
Reserved: 2008-07-30T00:00:00
Link: CVE-2008-3362

No data.

Status : Modified
Published: 2008-07-30T16:41:00.000
Modified: 2024-11-21T00:49:04.113
Link: CVE-2008-3362

No data.