We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2015-2079



Description

Usermin 0.980 through 1.x before 1.660 allows uconfig_save.cgi sig_file_free remote code execution because it uses the two argument (not three argument) form of Perl open.

Reserved 2015-02-24 | Published 2025-04-28 | Updated 2025-04-28 | Assigner mitre


CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')

Product status

Default status
unaffected

0.980 before 1.660
affected

References

code-white.com/public-vulnerability-list/

code-white.com/blog/2015-05-cve-2015-2079-rce-usermin/

cve.org (CVE-2015-2079)

nvd.nist.gov (CVE-2015-2079)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2015-2079

Support options

Helpdesk Chat, Email, Knowledgebase