CVSS Base Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Detection Type: Remote Banner
Solution Type: Vendor Patch
Summary: The WordPress plugin OptionTree is prone to multiple vulnerabilities.
Detection Method: Checks if a vulnerable version is present on the target host.
Technical Details: Following vulnerabilities exist:
- Object Injection because the + character is mishandled
- Object Injection because serialized classes are mishandled
Impact: Successful exploitation would allow an attacker to
execute arbitrary code on the target machine.
Affected Versions: WordPress OptionTree plugin through version 2.7.2.
Recommendations: Update to version 2.7.3.
Web application abuses
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
Fedora Update for community-mysql FEDORA-2019-c1fab3f139
Fedora Update for java-latest-openjdk FEDORA-2019-119312dbfc
Fedora Update for golang FEDORA-2019-34e097c66c
Fedora Update for community-mysql FEDORA-2019-48a0a07033
Fedora Update for aspell FEDORA-2019-73919e71f8
Fedora Update for crun FEDORA-2019-80a2646798
Fedora Update for mupdf FEDORA-2019-10f02ad597
Smartweares HOME easy Information Disclosure Vulnerability
Smartweares HOME easy Authentication Bypass Vulnerability
Smartwares HOME easy Detection
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.