fexsrv in F*EX (aka Frams' Fast File EXchange) before fex-20160919_2 allows eval injection (for unauthenticated remote code execution).
References
Link | Resource |
---|---|
https://cwe.mitre.org/data/definitions/95.html | Third Party Advisory |
https://fex.rus.uni-stuttgart.de | Product Vendor Advisory |
https://secfault-security.com/advisories/cve2020-15591.html | Exploit Patch Third Party Advisory |
https://cwe.mitre.org/data/definitions/95.html | Third Party Advisory |
https://fex.rus.uni-stuttgart.de | Product Vendor Advisory |
https://secfault-security.com/advisories/cve2020-15591.html | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://cwe.mitre.org/data/definitions/95.html - Third Party Advisory | |
References | () https://fex.rus.uni-stuttgart.de - Product, Vendor Advisory | |
References | () https://secfault-security.com/advisories/cve2020-15591.html - Exploit, Patch, Third Party Advisory |
Information
Published : 2022-03-17 16:15
Updated : 2024-11-21 05:05
NVD link : CVE-2020-15591
Mitre link : CVE-2020-15591
CVE.ORG link : CVE-2020-15591
JSON object : View
Products Affected
uni-stuttgart
- frams\'_fast_file_exchange
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')