Логотип exploitDog
bind:CVE-2018-14579
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-14579

Количество 2

Количество 2

nvd логотип

CVE-2018-14579

больше 7 лет назад

GolemCMS through 2008-12-24, if the install/ directory remains active after an installation, allows remote attackers to execute arbitrary PHP code by inserting this code into the "Database Information" "Table prefix" form field, or obtain sensitive information via a direct request for install/install.sql.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-3345-gfqq-q77j

больше 3 лет назад

GolemCMS through 2008-12-24, if the install/ directory remains active after an installation, allows remote attackers to execute arbitrary PHP code by inserting this code into the "Database Information" "Table prefix" form field, or obtain sensitive information via a direct request for install/install.sql.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-14579

GolemCMS through 2008-12-24, if the install/ directory remains active after an installation, allows remote attackers to execute arbitrary PHP code by inserting this code into the "Database Information" "Table prefix" form field, or obtain sensitive information via a direct request for install/install.sql.

CVSS3: 9.8
1%
Низкий
больше 7 лет назад
github логотип
GHSA-3345-gfqq-q77j

GolemCMS through 2008-12-24, if the install/ directory remains active after an installation, allows remote attackers to execute arbitrary PHP code by inserting this code into the "Database Information" "Table prefix" form field, or obtain sensitive information via a direct request for install/install.sql.

CVSS3: 9.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу