Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g37h-m5cc-48wj

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Numara FootPrints 7.5a through 7.5a1 and 8.0 through 8.0a allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) transcriptFile parameter to MRcgi/MRchat.pl or (2) LOADFILE parameter to MRcgi/MRABLoad2.pl. NOTE: some of these details are obtained from third party information.

Numara FootPrints 7.5a through 7.5a1 and 8.0 through 8.0a allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) transcriptFile parameter to MRcgi/MRchat.pl or (2) LOADFILE parameter to MRcgi/MRABLoad2.pl. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 88%
0.04061
Низкий

Дефекты

CWE-78

Связанные уязвимости

nvd
больше 16 лет назад

Numara FootPrints 7.5a through 7.5a1 and 8.0 through 8.0a allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) transcriptFile parameter to MRcgi/MRchat.pl or (2) LOADFILE parameter to MRcgi/MRABLoad2.pl. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 88%
0.04061
Низкий

Дефекты

CWE-78