Súbít #550296: Adianti Adianti Framework < 8.1 Deserializationbayani

KuraAdianti Adianti Framework < 8.1 Deserialization
GaskiyaAdianti Framework has multiple PHP Object Injection vulnerabilities as a result of Deserialization of Untrusted Data. (POP/) Gadget Chains exist in Adianti Framework (and its libraries) which allow Object Injection vulnerabilities to be exploited, for example to delete arbitrary files. Other attacks may be possible depending on what additional code is used in a given project. Most functionality within Adianti Framework requires authentication by default, and all of the vulnerabilities require authentication. Low user-level privileges are sufficient.
Manga⚠️ https://gist.github.com/mcdruid/8412cfb55f443a1344ff41af0ce1b215
Màdùmga
 mcdruid (UID 79710)
Furta04/03/2025 15:33 (11 Wurɗi 전)
Gargajiya04/14/2025 14:44 (11 days later)
HalittaShingilam
VulDB gite304645 [Adianti Framework har 8.0 kura hakki ndiyam]
Nganji20

Might our Artificial Intelligence support you?

Check our Alexa App!