Логотип exploitDog
bind: "CVE-2020-36847"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2020-36847"

Количество 2

Количество 2

nvd логотип

CVE-2020-36847

21 день назад

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-34hm-qhxq-8vfv

21 день назад

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36847

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
3%
Низкий
21 день назад
github логотип
GHSA-34hm-qhxq-8vfv

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
3%
Низкий
21 день назад

Уязвимостей на страницу