Логотип exploitDog
bind:CVE-2018-5779
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-5779

Количество 3

Количество 3

nvd логотип

CVE-2018-5779

почти 8 лет назад

A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to copy a malicious script into a newly generated PHP file and then execute the generated file using specially crafted requests. Successful exploit could allow an attacker to execute arbitrary code within the context of the application.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2ggv-vfg5-vf2c

больше 3 лет назад

A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to copy a malicious script into a newly generated PHP file and then execute the generated file using specially crafted requests. Successful exploit could allow an attacker to execute arbitrary code within the context of the application.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2018-00580

почти 8 лет назад

Уязвимость компонента конференц-связи телекоммуникационных систем Mitel Connect OnSite и ST14.2, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-5779

A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to copy a malicious script into a newly generated PHP file and then execute the generated file using specially crafted requests. Successful exploit could allow an attacker to execute arbitrary code within the context of the application.

CVSS3: 9.8
2%
Низкий
почти 8 лет назад
github логотип
GHSA-2ggv-vfg5-vf2c

A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to copy a malicious script into a newly generated PHP file and then execute the generated file using specially crafted requests. Successful exploit could allow an attacker to execute arbitrary code within the context of the application.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2018-00580

Уязвимость компонента конференц-связи телекоммуникационных систем Mitel Connect OnSite и ST14.2, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
2%
Низкий
почти 8 лет назад

Уязвимостей на страницу