Логотип exploitDog
bind:CVE-2017-5879
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-5879

Количество 2

Количество 2

nvd логотип

CVE-2017-5879

около 9 лет назад

An issue was discovered in Exponent CMS 2.4.1. This is a blind SQL injection that can be exploited by un-authenticated users via an HTTP GET request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability affects source_selector.php and the following parameter: src.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-g587-fj22-5v6v

больше 3 лет назад

An issue was discovered in Exponent CMS 2.4.1. This is a blind SQL injection that can be exploited by un-authenticated users via an HTTP GET request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability affects source_selector.php and the following parameter: src.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-5879

An issue was discovered in Exponent CMS 2.4.1. This is a blind SQL injection that can be exploited by un-authenticated users via an HTTP GET request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability affects source_selector.php and the following parameter: src.

CVSS3: 9.8
0%
Низкий
около 9 лет назад
github логотип
GHSA-g587-fj22-5v6v

An issue was discovered in Exponent CMS 2.4.1. This is a blind SQL injection that can be exploited by un-authenticated users via an HTTP GET request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability affects source_selector.php and the following parameter: src.

CVSS3: 9.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу