Логотип exploitDog
bind:CVE-2021-47667
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-47667

Количество 2

Количество 2

nvd логотип

CVE-2021-47667

10 месяцев назад

An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-r4mc-p68x-wx22

10 месяцев назад

An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-47667

An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.

CVSS3: 10
0%
Низкий
10 месяцев назад
github логотип
GHSA-r4mc-p68x-wx22

An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.

CVSS3: 10
0%
Низкий
10 месяцев назад

Уязвимостей на страницу