Логотип exploitDog
bind:CVE-2020-14933
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-14933

Количество 5

Количество 5

ubuntu логотип

CVE-2020-14933

больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2020-14933

больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2020-14933

больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2020-14933

больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachme ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gh2w-wqm3-32m4

больше 3 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-14933

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

CVSS3: 8.8
1%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-14933

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

CVSS3: 6.3
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-14933

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

CVSS3: 8.8
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-14933

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachme ...

CVSS3: 8.8
1%
Низкий
больше 5 лет назад
github логотип
GHSA-gh2w-wqm3-32m4

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу