Описание
nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl.
Ссылки
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:nlog:nlog:*:*:*:*:*:*:*:*
EPSS
Процентиль: 72%
0.00741
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
около 3 лет назад
nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl.
EPSS
Процентиль: 72%
0.00741
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other