Логотип exploitDog
bind:CVE-2009-0677
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2009-0677

Количество 2

Количество 2

nvd логотип

CVE-2009-0677

почти 17 лет назад

avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.

CVSS2: 6.5
EPSS: Средний
github логотип

GHSA-gpqh-rc5f-935m

почти 4 года назад

avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2009-0677

avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.

CVSS2: 6.5
15%
Средний
почти 17 лет назад
github логотип
GHSA-gpqh-rc5f-935m

avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.

15%
Средний
почти 4 года назад

Уязвимостей на страницу