Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2020-12641: Command Injection via “_im_convert_path” Parameter in Roundcube Webmail | https://github.com/mbadanoiu/CVE-2020-12641 | POC Details |
| 2 | MAL-004: Command Injection Bypass for CVE-2020-12641 in Roundcube Webmail | https://github.com/mbadanoiu/MAL-004 | POC Details |
| 3 | Roundcube Webmail before 1.4.4 contains a command injection caused by shell metacharacters in configuration settings for im_convert_path or im_identify_path, letting attackers execute arbitrary code, exploit requires attacker to control configuration settings. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-12641.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet