Логотип exploitDog
bind:CVE-2018-14910
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-14910

Количество 2

Количество 2

nvd логотип

CVE-2018-14910

больше 7 лет назад

SeaCMS v6.61 allows Remote Code execution by placing PHP code in an allowed IP address (aka ip) to /admin/admin_ip.php (aka /adm1n/admin_ip.php). The code is executed by visiting adm1n/admin_ip.php or data/admin/ip.php. This can also be exploited through CSRF.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-wp8g-6v2p-4vfv

больше 3 лет назад

SeaCMS v6.61 allows Remote Code execution by placing PHP code in an allowed IP address (aka ip) to /admin/admin_ip.php (aka /adm1n/admin_ip.php). The code is executed by visiting adm1n/admin_ip.php or data/admin/ip.php. This can also be exploited through CSRF.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-14910

SeaCMS v6.61 allows Remote Code execution by placing PHP code in an allowed IP address (aka ip) to /admin/admin_ip.php (aka /adm1n/admin_ip.php). The code is executed by visiting adm1n/admin_ip.php or data/admin/ip.php. This can also be exploited through CSRF.

CVSS3: 8.8
0%
Низкий
больше 7 лет назад
github логотип
GHSA-wp8g-6v2p-4vfv

SeaCMS v6.61 allows Remote Code execution by placing PHP code in an allowed IP address (aka ip) to /admin/admin_ip.php (aka /adm1n/admin_ip.php). The code is executed by visiting adm1n/admin_ip.php or data/admin/ip.php. This can also be exploited through CSRF.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу