Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2024-57252

OtCMS <=V7.46 is vulnerable to Server-Side Request Forgery (SSRF) in /admin/read.php, which can Read system files arbitrarily.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 15.9%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2024-57252
  • Otcms » Otcms » Version: 3.20
    cpe:2.3:a:otcms:otcms:3.20
  • Otcms » Otcms » Version: 3.61
    cpe:2.3:a:otcms:otcms:3.61
  • Otcms » Otcms » Version: 3.81
    cpe:2.3:a:otcms:otcms:3.81
  • Otcms » Otcms » Version: 3.85
    cpe:2.3:a:otcms:otcms:3.85
  • Otcms » Otcms » Version: 6.00
    cpe:2.3:a:otcms:otcms:6.00
  • Otcms » Otcms » Version: 6.01
    cpe:2.3:a:otcms:otcms:6.01
  • Otcms » Otcms » Version: 6.10
    cpe:2.3:a:otcms:otcms:6.10
  • Otcms » Otcms » Version: 6.11
    cpe:2.3:a:otcms:otcms:6.11
  • Otcms » Otcms » Version: 6.20
    cpe:2.3:a:otcms:otcms:6.20
  • Otcms » Otcms » Version: 6.21
    cpe:2.3:a:otcms:otcms:6.21
  • Otcms » Otcms » Version: 6.22
    cpe:2.3:a:otcms:otcms:6.22
  • Otcms » Otcms » Version: 6.23
    cpe:2.3:a:otcms:otcms:6.23
  • Otcms » Otcms » Version: 6.25
    cpe:2.3:a:otcms:otcms:6.25
  • Otcms » Otcms » Version: 6.30
    cpe:2.3:a:otcms:otcms:6.30
  • Otcms » Otcms » Version: 6.50
    cpe:2.3:a:otcms:otcms:6.50
  • Otcms » Otcms » Version: 6.60
    cpe:2.3:a:otcms:otcms:6.60
  • Otcms » Otcms » Version: 6.61
    cpe:2.3:a:otcms:otcms:6.61
  • Otcms » Otcms » Version: 6.62
    cpe:2.3:a:otcms:otcms:6.62
  • Otcms » Otcms » Version: 6.63
    cpe:2.3:a:otcms:otcms:6.63
  • Otcms » Otcms » Version: 6.70
    cpe:2.3:a:otcms:otcms:6.70
  • Otcms » Otcms » Version: 6.72
    cpe:2.3:a:otcms:otcms:6.72
  • Otcms » Otcms » Version: 6.80
    cpe:2.3:a:otcms:otcms:6.80
  • Otcms » Otcms » Version: 6.81
    cpe:2.3:a:otcms:otcms:6.81
  • Otcms » Otcms » Version: 6.82
    cpe:2.3:a:otcms:otcms:6.82
  • Otcms » Otcms » Version: 6.85
    cpe:2.3:a:otcms:otcms:6.85
  • Otcms » Otcms » Version: 6.86
    cpe:2.3:a:otcms:otcms:6.86
  • Otcms » Otcms » Version: 6.87
    cpe:2.3:a:otcms:otcms:6.87
  • Otcms » Otcms » Version: 6.90
    cpe:2.3:a:otcms:otcms:6.90
  • Otcms » Otcms » Version: 6.91
    cpe:2.3:a:otcms:otcms:6.91
  • Otcms » Otcms » Version: 6.92
    cpe:2.3:a:otcms:otcms:6.92
  • Otcms » Otcms » Version: 6.95
    cpe:2.3:a:otcms:otcms:6.95
  • Otcms » Otcms » Version: 7.00
    cpe:2.3:a:otcms:otcms:7.00
  • Otcms » Otcms » Version: 7.01
    cpe:2.3:a:otcms:otcms:7.01
  • Otcms » Otcms » Version: 7.10
    cpe:2.3:a:otcms:otcms:7.10
  • Otcms » Otcms » Version: 7.11
    cpe:2.3:a:otcms:otcms:7.11
  • Otcms » Otcms » Version: 7.15
    cpe:2.3:a:otcms:otcms:7.15
  • Otcms » Otcms » Version: 7.16
    cpe:2.3:a:otcms:otcms:7.16
  • Otcms » Otcms » Version: 7.20
    cpe:2.3:a:otcms:otcms:7.20
  • Otcms » Otcms » Version: 7.21
    cpe:2.3:a:otcms:otcms:7.21
  • Otcms » Otcms » Version: 7.25
    cpe:2.3:a:otcms:otcms:7.25
  • Otcms » Otcms » Version: 7.27
    cpe:2.3:a:otcms:otcms:7.27
  • Otcms » Otcms » Version: 7.30
    cpe:2.3:a:otcms:otcms:7.30
  • Otcms » Otcms » Version: 7.31
    cpe:2.3:a:otcms:otcms:7.31
  • Otcms » Otcms » Version: 7.32
    cpe:2.3:a:otcms:otcms:7.32
  • Otcms » Otcms » Version: 7.35
    cpe:2.3:a:otcms:otcms:7.35
  • Otcms » Otcms » Version: 7.36
    cpe:2.3:a:otcms:otcms:7.36
  • Otcms » Otcms » Version: 7.40
    cpe:2.3:a:otcms:otcms:7.40
  • Otcms » Otcms » Version: 7.41
    cpe:2.3:a:otcms:otcms:7.41
  • Otcms » Otcms » Version: 7.45
    cpe:2.3:a:otcms:otcms:7.45
  • Otcms » Otcms » Version: 7.46
    cpe:2.3:a:otcms:otcms:7.46


Contact Us

Shodan ® - All rights reserved