Логотип exploitDog
bind:CVE-2026-23920
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-23920

Количество 3

Количество 3

nvd логотип

CVE-2026-23920

9 дней назад

Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.

EPSS: Низкий
debian логотип

CVE-2026-23920

9 дней назад

Host and event action script input is validated with a regex (set by t ...

EPSS: Низкий
github логотип

GHSA-2h5x-h7x4-hm9h

9 дней назад

Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-23920

Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.

0%
Низкий
9 дней назад
debian логотип
CVE-2026-23920

Host and event action script input is validated with a regex (set by t ...

0%
Низкий
9 дней назад
github логотип
GHSA-2h5x-h7x4-hm9h

Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.

0%
Низкий
9 дней назад

Уязвимостей на страницу