logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2019-12725

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2019-12725

Description:
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
Last updated date:
05/13/2021

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
09/30/2021
Reference url to background

https://blogs.juniper.net/en-us/threat-research/necro-python-botnet-goes-after-vulnerable-visualtools-dvr

Type:
exploit
Confidence:
HIGH
Date of publishing:
05/13/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
05/22/2021
Reference url to background

https://github.com/Sma11New/PocList

Type:
exploit
Confidence:
HIGH
Date of publishing:
05/22/2021
Reference url to background

https://github.com/sma11new/PocList

Type:
exploit
Confidence:
HIGH
Date of publishing:
06/13/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
06/13/2021
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy