Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rx2r-cwgc-cg7w

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

phpwcms 1.2.5-DEV and earlier, and 1.1 before RC4, allows remote attackers to execute arbitrary code via a crafted argument to the nome_evento parameter to phpwcms_code_snippets/mail_file_form.php and (2) sample_ext_php/mail_file_form.php, which is processed by the render_PHPcode function.

phpwcms 1.2.5-DEV and earlier, and 1.1 before RC4, allows remote attackers to execute arbitrary code via a crafted argument to the nome_evento parameter to phpwcms_code_snippets/mail_file_form.php and (2) sample_ext_php/mail_file_form.php, which is processed by the render_PHPcode function.

EPSS

Процентиль: 88%
0.03765
Низкий

Связанные уязвимости

nvd
почти 19 лет назад

phpwcms 1.2.5-DEV and earlier, and 1.1 before RC4, allows remote attackers to execute arbitrary code via a crafted argument to the nome_evento parameter to phpwcms_code_snippets/mail_file_form.php and (2) sample_ext_php/mail_file_form.php, which is processed by the render_PHPcode function.

EPSS

Процентиль: 88%
0.03765
Низкий