Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-13576

Опубликовано: 10 фев. 2021
Источник: debian
EPSS Низкий

Описание

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gsoapfixed2.8.104-3package
gsoapignoredstretchpackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187

EPSS

Процентиль: 73%
0.0076
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 5 лет назад

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 9.8
nvd
почти 5 лет назад

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

suse-cvrf
почти 5 лет назад

Security update for gsoap

CVSS3: 9.8
github
больше 3 лет назад

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 9.8
fstec
больше 5 лет назад

Уязвимость плагина WS-Addressing среды разработки программного обеспечения gSOAP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 73%
0.0076
Низкий