Логотип exploitDog
bind:CVE-2020-36243
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36243

Количество 2

Количество 2

nvd логотип

CVE-2020-36243

около 5 лет назад

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

CVSS3: 8.8
EPSS: Высокий
github логотип

GHSA-vqv8-75fg-f6w9

больше 3 лет назад

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36243

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

CVSS3: 8.8
89%
Высокий
около 5 лет назад
github логотип
GHSA-vqv8-75fg-f6w9

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

89%
Высокий
больше 3 лет назад

Уязвимостей на страницу