Логотип exploitDog
bind:CVE-2018-19514
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-19514

Количество 2

Количество 2

nvd логотип

CVE-2018-19514

почти 7 лет назад

In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-4f9x-hmvr-7w77

больше 3 лет назад

In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-19514

In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file.

CVSS3: 9.8
5%
Низкий
почти 7 лет назад
github логотип
GHSA-4f9x-hmvr-7w77

In Webgalamb through 7.0, an arbitrary code execution vulnerability could be exploited remotely without authentication. Exploitation requires authentication bypass to access administrative functions of the site to upload a crafted CSV file with a malicious payload that becomes part of a PHP eval() expression in the subscriber.php file.

CVSS3: 9.8
5%
Низкий
больше 3 лет назад

Уязвимостей на страницу