Логотип exploitDog
bind: "CVE-2024-58287"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-58287"

Количество 2

Количество 2

nvd логотип

CVE-2024-58287

2 месяца назад

reNgine 2.2.0 contains a command injection vulnerability in the nmap_cmd parameter of scan engine configuration that allows authenticated attackers to execute arbitrary commands. Attackers can modify the nmap_cmd parameter with malicious base64-encoded payloads to achieve remote code execution during scan engine configuration.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-c9mq-3m6j-gvhw

2 месяца назад

reNgine 2.2.0 contains a command injection vulnerability in the nmap_cmd parameter of scan engine configuration that allows authenticated attackers to execute arbitrary commands. Attackers can modify the nmap_cmd parameter with malicious base64-encoded payloads to achieve remote code execution during scan engine configuration.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-58287

reNgine 2.2.0 contains a command injection vulnerability in the nmap_cmd parameter of scan engine configuration that allows authenticated attackers to execute arbitrary commands. Attackers can modify the nmap_cmd parameter with malicious base64-encoded payloads to achieve remote code execution during scan engine configuration.

CVSS3: 8.8
1%
Низкий
2 месяца назад
github логотип
GHSA-c9mq-3m6j-gvhw

reNgine 2.2.0 contains a command injection vulnerability in the nmap_cmd parameter of scan engine configuration that allows authenticated attackers to execute arbitrary commands. Attackers can modify the nmap_cmd parameter with malicious base64-encoded payloads to achieve remote code execution during scan engine configuration.

CVSS3: 8.8
1%
Низкий
2 месяца назад

Уязвимостей на страницу