Логотип exploitDog
bind:CVE-2023-25263
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-25263

Количество 2

Количество 2

nvd логотип

CVE-2023-25263

почти 3 года назад

In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-v4pr-w7x8-m4mg

почти 3 года назад

In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-25263

In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.

CVSS3: 5.5
0%
Низкий
почти 3 года назад
github логотип
GHSA-v4pr-w7x8-m4mg

In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.

CVSS3: 5.5
0%
Низкий
почти 3 года назад

Уязвимостей на страницу