Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-whgf-2jh4-j6w3

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Zeroboard 4.1, when the "allow_url_fopen" and "register_globals" variables are enabled, allows remote attackers to execute arbitrary PHP code by modifying the _zb_path parameter to reference a URL on a remote web server that contains the code.

Zeroboard 4.1, when the "allow_url_fopen" and "register_globals" variables are enabled, allows remote attackers to execute arbitrary PHP code by modifying the _zb_path parameter to reference a URL on a remote web server that contains the code.

EPSS

Процентиль: 87%
0.03263
Низкий

Связанные уязвимости

nvd
около 23 лет назад

Zeroboard 4.1, when the "allow_url_fopen" and "register_globals" variables are enabled, allows remote attackers to execute arbitrary PHP code by modifying the _zb_path parameter to reference a URL on a remote web server that contains the code.

EPSS

Процентиль: 87%
0.03263
Низкий