Логотип exploitDog
bind:CVE-2023-31689
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-31689

Количество 2

Количество 2

nvd логотип

CVE-2023-31689

больше 2 лет назад

In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-rq34-mcvw-8gj8

больше 2 лет назад

In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-31689

In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution.

CVSS3: 9.8
5%
Низкий
больше 2 лет назад
github логотип
GHSA-rq34-mcvw-8gj8

In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution.

CVSS3: 9.8
5%
Низкий
больше 2 лет назад

Уязвимостей на страницу