CVE-2018-15747
21.06.2019, 14:15
The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file.Enginsight
Vendor | Product | Version |
---|---|---|
glot | glot-www | 𝑥 ≤ 2018-05-19 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration