Логотип exploitDog
bind:CVE-2020-21999
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-21999

Количество 2

Количество 2

nvd логотип

CVE-2020-21999

почти 5 лет назад

iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-gvmq-4gxq-mx44

больше 3 лет назад

iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-21999

iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

CVSS3: 8.8
20%
Средний
почти 5 лет назад
github логотип
GHSA-gvmq-4gxq-mx44

iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

20%
Средний
больше 3 лет назад

Уязвимостей на страницу