Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8gjc-8rv5-crcg

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The get_file_type function in lib/file_content.php in DFLabs PTK 0.1, 0.2, and 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters after an arg1= sequence in a filename within a forensic image.

The get_file_type function in lib/file_content.php in DFLabs PTK 0.1, 0.2, and 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters after an arg1= sequence in a filename within a forensic image.

EPSS

Процентиль: 92%
0.0884
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
почти 17 лет назад

The get_file_type function in lib/file_content.php in DFLabs PTK 0.1, 0.2, and 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters after an arg1= sequence in a filename within a forensic image.

EPSS

Процентиль: 92%
0.0884
Низкий

Дефекты

CWE-20