Логотип exploitDog
bind:CVE-2024-4748
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-4748

Количество 2

Количество 2

nvd логотип

CVE-2024-4748

больше 1 года назад

The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server.  The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malicious request to the locally launched server.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-fmp7-6783-4ggp

больше 1 года назад

The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server.  The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malicious request to the locally launched server.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-4748

The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server.  The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malicious request to the locally launched server.

CVSS3: 8.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-fmp7-6783-4ggp

The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server.  The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malicious request to the locally launched server.

CVSS3: 8.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу