Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c5q8-4xw7-4w89

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

execInBackground.php in J-OWAMP Web Interface 2.1b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

execInBackground.php in J-OWAMP Web Interface 2.1b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

EPSS

Процентиль: 87%
0.03274
Низкий

Связанные уязвимости

nvd
около 19 лет назад

execInBackground.php in J-OWAMP Web Interface 2.1b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

EPSS

Процентиль: 87%
0.03274
Низкий