Логотип exploitDog
bind:CVE-2023-49254
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-49254

Количество 2

Количество 2

nvd логотип

CVE-2023-49254

около 2 лет назад

Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-9pqq-c77f-g45f

около 2 лет назад

Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-49254

Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-9pqq-c77f-g45f

Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.

CVSS3: 8.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу