Логотип exploitDog
bind:CVE-2024-7954
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-7954

Количество 5

Количество 5

ubuntu логотип

CVE-2024-7954

больше 1 года назад

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

CVSS3: 9.8
EPSS: Критический
nvd логотип

CVE-2024-7954

больше 1 года назад

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

CVSS3: 9.8
EPSS: Критический
debian логотип

CVE-2024-7954

больше 1 года назад

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4. ...

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-42mv-3h37-wfh9

больше 1 года назад

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2024-07708

больше 1 года назад

Уязвимость плагина porte_plume системы управления контентом SPIP, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-7954

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

CVSS3: 9.8
94%
Критический
больше 1 года назад
nvd логотип
CVE-2024-7954

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

CVSS3: 9.8
94%
Критический
больше 1 года назад
debian логотип
CVE-2024-7954

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4. ...

CVSS3: 9.8
94%
Критический
больше 1 года назад
github логотип
GHSA-42mv-3h37-wfh9

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

CVSS3: 9.8
94%
Критический
больше 1 года назад
fstec логотип
BDU:2024-07708

Уязвимость плагина porte_plume системы управления контентом SPIP, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
94%
Критический
больше 1 года назад

Уязвимостей на страницу