Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hw72-fhc8-8qf4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Direct static code injection vulnerability in error.php in GuppY 4.5.9 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via the _SERVER[REMOTE_ADDR] parameter, which is injected into a .inc script that is later included by the main script.

Direct static code injection vulnerability in error.php in GuppY 4.5.9 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via the _SERVER[REMOTE_ADDR] parameter, which is injected into a .inc script that is later included by the main script.

EPSS

Процентиль: 90%
0.05605
Низкий

Связанные уязвимости

nvd
около 20 лет назад

Direct static code injection vulnerability in error.php in GuppY 4.5.9 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via the _SERVER[REMOTE_ADDR] parameter, which is injected into a .inc script that is later included by the main script.

EPSS

Процентиль: 90%
0.05605
Низкий