Описание
RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via the _oups parameter.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| devel | not-affected | |
| esm-apps/bionic | released | 3.1.4-4~deb9u5ubuntu0.1~esm2 |
| esm-apps/focal | not-affected | code not present |
| esm-apps/jammy | needed | |
| esm-apps/noble | not-affected | |
| esm-apps/xenial | needed | |
| focal | not-affected | code not present |
| jammy | needed | |
| kinetic | ignored | end of life, was needs-triage |
Показывать по
10
EPSS
Процентиль: 92%
0.07766
Низкий
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
nvd
около 3 лет назад
RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via the _oups parameter.
CVSS3: 8.8
debian
около 3 лет назад
RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to ...
CVSS3: 8.8
github
около 3 лет назад
RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via a GET parameter
EPSS
Процентиль: 92%
0.07766
Низкий
8.8 High
CVSS3