Логотип exploitDog
bind:CVE-2024-57687
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-57687

Количество 2

Количество 2

nvd логотип

CVE-2024-57687

около 1 года назад

An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the "Cookie" GET request parameter.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-x58x-7p55-7r3g

около 1 года назад

An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the "Cookie" GET request parameter.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-57687

An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the "Cookie" GET request parameter.

CVSS3: 9.8
4%
Низкий
около 1 года назад
github логотип
GHSA-x58x-7p55-7r3g

An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the "Cookie" GET request parameter.

CVSS3: 9.8
4%
Низкий
около 1 года назад

Уязвимостей на страницу