Логотип exploitDog
bind:CVE-2024-58284
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-58284

Количество 2

Количество 2

nvd логотип

CVE-2024-58284

2 месяца назад

PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-jg32-m8mr-6xvg

2 месяца назад

PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-58284

PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.

CVSS3: 7.2
1%
Низкий
2 месяца назад
github логотип
GHSA-jg32-m8mr-6xvg

PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.

CVSS3: 7.2
1%
Низкий
2 месяца назад

Уязвимостей на страницу