Логотип exploitDog
bind:CVE-2020-36847
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36847

Количество 2

Количество 2

nvd логотип

CVE-2020-36847

22 дня назад

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-34hm-qhxq-8vfv

22 дня назад

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36847

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
3%
Низкий
22 дня назад
github логотип
GHSA-34hm-qhxq-8vfv

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
3%
Низкий
22 дня назад

Уязвимостей на страницу