Логотип exploitDog
bind: "CVE-2023-38745"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-38745"

Количество 7

Количество 7

ubuntu логотип

CVE-2023-38745

почти 2 года назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
EPSS: Низкий
redhat логотип

CVE-2023-38745

почти 2 года назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2023-38745

почти 2 года назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2023-38745

почти 2 года назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered ...

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-9hpj-m9v9-5wvw

почти 2 года назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
EPSS: Низкий
redos логотип

ROS-20241015-01

8 месяцев назад

Множественные уязвимости pandoc

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2024-08375

почти 2 года назад

Уязвимость библиотеки преобразования форматов разметки Pandoc языка программирования Haskell, позволяющая нарушителю создавать или перезаписывать произвольные файлы в системе

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-38745

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-38745

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 5
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-38745

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-38745

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered ...

CVSS3: 6.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-9hpj-m9v9-5wvw

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
0%
Низкий
почти 2 года назад
redos логотип
ROS-20241015-01

Множественные уязвимости pandoc

CVSS3: 6.3
8 месяцев назад
fstec логотип
BDU:2024-08375

Уязвимость библиотеки преобразования форматов разметки Pandoc языка программирования Haskell, позволяющая нарушителю создавать или перезаписывать произвольные файлы в системе

CVSS3: 6.3
0%
Низкий
почти 2 года назад

Уязвимостей на страницу