Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-27575
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Maxum Rumpus 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Maxum Development Maxum Rumpus是美国 (Maxum Development)公司的一个应用软件。提供FTP,FTPS,WebDAV,SFTP和完全可自定义的Web文件传输界面,并使其易于与任何地方的任何人安全地交换文件。 Maxum Rumpus 8.2.13 and 8.2.14 存在命令注入漏洞,该漏洞源于web管理包含管理员能够管理用户的功能。“编辑用户”表单包含一个容易因验证不足而被命令注入的参数。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2020-27575
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-27575
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-27575

No comments yet


Leave a comment