Логотип exploitDog
bind:CVE-2020-37009
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-37009

Количество 2

Количество 2

nvd логотип

CVE-2020-37009

10 дней назад

MedDream PACS Server 6.8.3.751 contains an authenticated remote code execution vulnerability that allows authorized users to upload malicious PHP files. Attackers can exploit the uploadImage.php endpoint by authenticating and uploading a PHP shell to execute arbitrary system commands with elevated privileges.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-hxfj-rc88-5v2p

10 дней назад

MedDream PACS Server 6.8.3.751 contains an authenticated remote code execution vulnerability that allows authorized users to upload malicious PHP files. Attackers can exploit the uploadImage.php endpoint by authenticating and uploading a PHP shell to execute arbitrary system commands with elevated privileges.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-37009

MedDream PACS Server 6.8.3.751 contains an authenticated remote code execution vulnerability that allows authorized users to upload malicious PHP files. Attackers can exploit the uploadImage.php endpoint by authenticating and uploading a PHP shell to execute arbitrary system commands with elevated privileges.

CVSS3: 8.8
0%
Низкий
10 дней назад
github логотип
GHSA-hxfj-rc88-5v2p

MedDream PACS Server 6.8.3.751 contains an authenticated remote code execution vulnerability that allows authorized users to upload malicious PHP files. Attackers can exploit the uploadImage.php endpoint by authenticating and uploading a PHP shell to execute arbitrary system commands with elevated privileges.

CVSS3: 8.8
0%
Низкий
10 дней назад

Уязвимостей на страницу