Логотип exploitDog
bind:CVE-2012-5653
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-5653

Количество 4

Количество 4

ubuntu логотип

CVE-2012-5653

больше 12 лет назад

The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.

CVSS2: 6
EPSS: Низкий
nvd логотип

CVE-2012-5653

больше 12 лет назад

The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.

CVSS2: 6
EPSS: Низкий
debian логотип

CVE-2012-5653

больше 12 лет назад

The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 ...

CVSS2: 6
EPSS: Низкий
github логотип

GHSA-cv5g-6h34-8w32

около 3 лет назад

The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2012-5653

The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.

CVSS2: 6
1%
Низкий
больше 12 лет назад
nvd логотип
CVE-2012-5653

The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.

CVSS2: 6
1%
Низкий
больше 12 лет назад
debian логотип
CVE-2012-5653

The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 ...

CVSS2: 6
1%
Низкий
больше 12 лет назад
github логотип
GHSA-cv5g-6h34-8w32

The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.

1%
Низкий
около 3 лет назад

Уязвимостей на страницу