From 482fe556174ca6347becc26f05697062cdd99c67 Mon Sep 17 00:00:00 2001 From: Jongwon Baek Date: Tue, 29 Nov 2022 14:36:19 +0900 Subject: [PATCH] Update CVE-2019-12725.yaml --- cves/2019/CVE-2019-12725.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-12725.yaml b/cves/2019/CVE-2019-12725.yaml index 69712322c3..1d4c362566 100644 --- a/cves/2019/CVE-2019-12725.yaml +++ b/cves/2019/CVE-2019-12725.yaml @@ -1,7 +1,7 @@ id: CVE-2019-12725 info: - name: Zeroshell 3.9.0 Remote Command Execution + name: Zeroshell 3.9.0 - Remote Command Execution author: dwisiswant0,akincibor severity: critical description: Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.