2 results (0.010 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

11 May 2021 — zzzcms zzzphp before 2.0.4 allows remote attackers to execute arbitrary OS commands by placing them in the keys parameter of a ?location=search URI, as demonstrated by an OS command within an "if" "end if" block. zzzcms zzzphp versiones anteriores a 2.0.4, permite a atacantes remotos ejecutar comandos arbitrarios del Sistema Operativo al colocarlos en el parámetro keys de un URI ?location=search, como es demostrado por un comando del Sistema Operativo dentro de un bloque "if" "end if" • http://www.zzzcms.com/a/news/31_282_1.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 1

14 Oct 2019 — parserIfLabel in inc/zzz_template.php in ZZZCMS zzzphp 1.7.3 allows remote attackers to execute arbitrary code because the danger_key function can be bypassed via manipulations such as strtr. La función parserIfLabel en el archivo inc/zzz_template.php en ZZZCMS zzzphp versión 1.7.3, permite a atacantes remotos ejecutar código arbitrario porque la función danger_key puede ser omitida mediante manipulaciones tales como strtr. • https://github.com/Tardis07/CVE_GO/blob/master/zzzphp_code_execution_v1.7.3.md • CWE-94: Improper Control of Generation of Code ('Code Injection') •