Логотип exploitDog
bind:CVE-2011-4106
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-4106

Количество 2

Количество 2

nvd логотип

CVE-2011-4106

больше 12 лет назад

TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.

CVSS2: 6.8
EPSS: Средний
github логотип

GHSA-h589-v7r4-6pgf

больше 3 лет назад

TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2011-4106

TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.

CVSS2: 6.8
26%
Средний
больше 12 лет назад
github логотип
GHSA-h589-v7r4-6pgf

TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.

26%
Средний
больше 3 лет назад

Уязвимостей на страницу