Page 3 of 12 results (0.004 seconds)

CVSS: 7.5EPSS: 18%CPEs: 1EXPL: 3

Multiple buffer overflows in H-Sphere WebShell 2.3 allow remote attackers to execute arbitrary code via (1) a long URL content type in CGI::readFile, (2) a long path in diskusage, and (3) a long fname in flist. • https://www.exploit-db.com/exploits/22128 https://www.exploit-db.com/exploits/22129 http://psoft.net/misc/webshell_patch.html http://secunia.com/advisories/7832 http://www.iss.net/security_center/static/10999.php http://www.iss.net/security_center/static/11002.php http://www.iss.net/security_center/static/11003.php http://www.securityfocus.com/archive/1/305313 http://www.securityfocus.com/bid/6527 http://www.securityfocus.com/bid/6537 http://www.securityfocus.co •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

H-Sphere WebShell 2.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) mode and (2) zipfile parameters in a URL request. • http://psoft.net/misc/webshell_patch.html http://www.iss.net/security_center/static/11001.php http://www.securityfocus.com/archive/1/305313 http://www.securityfocus.com/bid/6537 http://www.securityfocus.com/bid/6539 http://www.securitytracker.com/id?1005893 •