Логотип exploitDog
bind:CVE-2020-36847
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36847

Количество 2

Количество 2

nvd логотип

CVE-2020-36847

7 месяцев назад

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-34hm-qhxq-8vfv

7 месяцев назад

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36847

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
86%
Высокий
7 месяцев назад
github логотип
GHSA-34hm-qhxq-8vfv

The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.

CVSS3: 9.8
86%
Высокий
7 месяцев назад

Уязвимостей на страницу