Command Injection in GitHub repository froxlor/froxlor prior to 2.0.8.
References
Configurations
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/171108/Froxlor-2.0.6-Remote-Command-Execution.html - | |
References | () http://packetstormsecurity.com/files/171729/Froxlor-2.0.3-Stable-Remote-Code-Execution.html - | |
References | () https://github.com/froxlor/froxlor/commit/090cfc26f2722ac3036cc7fd1861955bc36f065a - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/ff4e177b-ba48-4913-bbfa-ab8ce0db5943 - Exploit, Patch, Third Party Advisory |
Information
Published : 2023-01-16 01:15
Updated : 2024-11-21 07:36
NVD link : CVE-2023-0315
Mitre link : CVE-2023-0315
CVE.ORG link : CVE-2023-0315
JSON object : View
Products Affected
froxlor
- froxlor
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')