The porte_plume plugin in SPIP before version 4.30-alpha2, 4.2.13, and 4.1.16 allows remote unauthenticated attackers to execute arbitrary PHP code via crafted HTTP request
Reporter | Title | Published | Views | Family All 13 |
---|---|---|---|---|
![]() | UBUNTU-CVE-2024-7954 | 23 Aug 202418:15 | – | osv |
![]() | CVE-2024-7954 | 23 Aug 202418:15 | – | osv |
![]() | CVE-2024-7954 | 23 Aug 202400:00 | – | ubuntucve |
![]() | CVE-2024-7954 SPIP porte_plume Plugin Arbitrary PHP Execution | 23 Aug 202417:43 | – | vulnrichment |
![]() | CVE-2024-7954 | 5 Feb 202511:49 | – | redhatcve |
![]() | CVE-2024-7954 | 23 Aug 202418:15 | – | cve |
![]() | SPIP Porte Plume Plugin - Remote Code Execution | 29 Aug 202400:22 | – | nuclei |
![]() | CVE-2024-7954 | 2 Feb 202500:00 | – | circl |
![]() | CVE-2024-7954 SPIP porte_plume Plugin Arbitrary PHP Execution | 23 Aug 202417:43 | – | cvelist |
![]() | Exploit for CVE-2024-7954 | 15 Nov 202421:08 | – | githubexploit |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo