Логотип exploitDog
bind:CVE-2024-0603
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-0603

Количество 3

Количество 3

nvd логотип

CVE-2024-0603

около 2 лет назад

A vulnerability classified as critical has been found in ZhiCms up to 4.0. This affects an unknown part of the file app/plug/controller/giftcontroller.php. The manipulation of the argument mylike leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250839.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-2m4g-hr2m-w586

около 2 лет назад

A vulnerability classified as critical has been found in ZhiCms up to 4.0. This affects an unknown part of the file app/plug/controller/giftcontroller.php. The manipulation of the argument mylike leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250839.

CVSS3: 7.3
EPSS: Низкий
fstec логотип

BDU:2024-01237

около 2 лет назад

Уязвимость сценария app/plug/controller/giftcontroller.php CMS-системы Zhicms, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-0603

A vulnerability classified as critical has been found in ZhiCms up to 4.0. This affects an unknown part of the file app/plug/controller/giftcontroller.php. The manipulation of the argument mylike leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250839.

CVSS3: 7.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-2m4g-hr2m-w586

A vulnerability classified as critical has been found in ZhiCms up to 4.0. This affects an unknown part of the file app/plug/controller/giftcontroller.php. The manipulation of the argument mylike leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250839.

CVSS3: 7.3
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-01237

Уязвимость сценария app/plug/controller/giftcontroller.php CMS-системы Zhicms, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 9.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу