Логотип exploitDog
bind:CVE-2025-42959
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-42959

Количество 3

Количество 3

nvd логотип

CVE-2025-42959

7 месяцев назад

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-j74w-g6f3-9wr9

7 месяцев назад

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2025-10643

7 месяцев назад

Уязвимость программных интеграционных платформ SAP NetWeaver ABAP Server и ABAP Platform, связанная с применением однофакторной аутентификации, позволяющая нарушителю полностью компрометировать систему

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-42959

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

CVSS3: 8.1
0%
Низкий
7 месяцев назад
github логотип
GHSA-j74w-g6f3-9wr9

An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.

CVSS3: 8.1
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-10643

Уязвимость программных интеграционных платформ SAP NetWeaver ABAP Server и ABAP Platform, связанная с применением однофакторной аутентификации, позволяющая нарушителю полностью компрометировать систему

CVSS3: 8.1
0%
Низкий
7 месяцев назад

Уязвимостей на страницу