Логотип exploitDog
bind:CVE-2024-40673
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-40673

Количество 3

Количество 3

ubuntu логотип

CVE-2024-40673

около 1 года назад

In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-40673

около 1 года назад

In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-wmwg-vmx2-qg37

около 1 года назад

In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-40673

In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 6.5
1%
Низкий
около 1 года назад
nvd логотип
CVE-2024-40673

In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 6.5
1%
Низкий
около 1 года назад
github логотип
GHSA-wmwg-vmx2-qg37

In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 6.5
1%
Низкий
около 1 года назад

Уязвимостей на страницу