Логотип exploitDog
bind:CVE-2023-3267
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-3267

Количество 2

Количество 2

nvd логотип

CVE-2023-3267

больше 2 лет назад

When adding a remote backup location, an authenticated user can pass arbitrary OS commands through the username field. The username is passed without sanitization into CMD running as NT/Authority System. An authenticated attacker can leverage this vulnerability to execute arbitrary code with system-level access to the CyberPower PowerPanel Enterprise server.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-hpm4-5h9r-6rg6

больше 2 лет назад

When adding a remote backup location, an authenticated user can pass arbitrary OS commands through the username field. The username is passed without sanitization into CMD running as NT/Authority System. An authenticated attacker can leverage this vulnerability to execute arbitrary code with system-level access to the CyberPower PowerPanel Enterprise server.

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-3267

When adding a remote backup location, an authenticated user can pass arbitrary OS commands through the username field. The username is passed without sanitization into CMD running as NT/Authority System. An authenticated attacker can leverage this vulnerability to execute arbitrary code with system-level access to the CyberPower PowerPanel Enterprise server.

CVSS3: 9.1
0%
Низкий
больше 2 лет назад
github логотип
GHSA-hpm4-5h9r-6rg6

When adding a remote backup location, an authenticated user can pass arbitrary OS commands through the username field. The username is passed without sanitization into CMD running as NT/Authority System. An authenticated attacker can leverage this vulnerability to execute arbitrary code with system-level access to the CyberPower PowerPanel Enterprise server.

CVSS3: 9.1
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу