| Added |
Description |
|
A vulnerability, which was classified as critical, has been found in Zend.To up to 6.10-6 Beta. This issue affects the function exec of the file NSSDropoff.php. The manipulation of the argument file_1 leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.10-7 is able to address this issue. It is recommended to upgrade the affected component. This affects a rather old version of the software. The vendor recommends updating to the latest release.
|
| Added |
CVSS V4.0 |
|
AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
| Added |
CVSS V3.1 |
|
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
| Added |
CVSS V2 |
|
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
|
| Added |
CWE |
|
CWE-77
|
| Added |
CWE |
|
CWE-78
|
| Added |
Reference |
|
https://matheuscezar.github.io/2025/05/24/0-day-in-zend-to.html
|
| Added |
Reference |
|
https://vuldb.com/?ctiid.311789
|
| Added |
Reference |
|
https://vuldb.com/?id.311789
|
| Added |
Reference |
|
https://vuldb.com/?submit.589178
|