Описание
execInBackground.php in J-OWAMP Web Interface 2.1b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Уязвимые конфигурации
Конфигурация 1Версия до 2.1b (включая)
cpe:2.3:a:j-owamp:web_interface:*:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.03274
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
execInBackground.php in J-OWAMP Web Interface 2.1b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
EPSS
Процентиль: 87%
0.03274
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other