Логотип exploitDog
bind:CVE-2018-6651
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-6651

Количество 2

Количество 2

nvd логотип

CVE-2018-6651

около 8 лет назад

In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-g952-h9rv-wc2r

больше 3 лет назад

In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-6651

In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer.

CVSS3: 8.8
0%
Низкий
около 8 лет назад
github логотип
GHSA-g952-h9rv-wc2r

In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу