Логотип exploitDog
bind:CVE-2025-2244
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-2244

Количество 2

Количество 2

nvd логотип

CVE-2025-2244

10 месяцев назад

A vulnerability in the sendMailFromRemoteSource method in Emails.php  as used in Bitdefender GravityZone Console unsafely uses php unserialize() on user-supplied input without validation. By crafting a malicious serialized payload, an attacker can trigger PHP object injection, perform a file write, and gain arbitrary command execution on the host system.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-rrv5-7vmv-whmj

10 месяцев назад

A vulnerability in the sendMailFromRemoteSource method in Emails.php  as used in Bitdefender GravityZone Console unsafely uses php unserialize() on user-supplied input without validation. By crafting a malicious serialized payload, an attacker can trigger PHP object injection, perform a file write, and gain arbitrary command execution on the host system.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-2244

A vulnerability in the sendMailFromRemoteSource method in Emails.php  as used in Bitdefender GravityZone Console unsafely uses php unserialize() on user-supplied input without validation. By crafting a malicious serialized payload, an attacker can trigger PHP object injection, perform a file write, and gain arbitrary command execution on the host system.

CVSS3: 9.8
2%
Низкий
10 месяцев назад
github логотип
GHSA-rrv5-7vmv-whmj

A vulnerability in the sendMailFromRemoteSource method in Emails.php  as used in Bitdefender GravityZone Console unsafely uses php unserialize() on user-supplied input without validation. By crafting a malicious serialized payload, an attacker can trigger PHP object injection, perform a file write, and gain arbitrary command execution on the host system.

CVSS3: 9.8
2%
Низкий
10 месяцев назад

Уязвимостей на страницу