Grav's Twig processing allows arbitrary PHP functions, leading to code execution and privilege escalation
Reporter | Title | Published | Views | Family All 13 |
---|---|---|---|---|
![]() | Remote Code Execution | 19 Apr 202109:30 | – | veracode |
![]() | CVE-2021-29440 | 13 Apr 202120:15 | – | cve |
![]() | Grav CMS 1.7.10 Server-Side Template Injection | 7 Jun 202100:00 | – | packetstorm |
![]() | Grav CMS 1.7.10 - Server-Side Template Injection (SSTI) (Authenticated) Exploit | 7 Jun 202100:00 | – | zdt |
![]() | CVE-2021-29440 | 13 Apr 202120:15 | – | nvd |
![]() | Grav Code Injection Vulnerability | 6 May 202100:00 | – | cnvd |
![]() | Grav's Twig processing allowing dangerous PHP functions by default | 16 Apr 202119:53 | – | osv |
![]() | Exploit for Code Injection in Getgrav Grav | 6 Jun 202100:51 | – | githubexploit |
![]() | Grav CMS Command Injection (CVE-2021-29440) | 24 Jun 202100:00 | – | checkpoint_advisories |
![]() | Design/Logic Flaw | 13 Apr 202120:15 | – | prion |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo