Логотип exploitDog
bind:"CVE-2023-38745"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-38745"

Количество 7

Количество 7

ubuntu логотип

CVE-2023-38745

около 2 лет назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
EPSS: Низкий
redhat логотип

CVE-2023-38745

около 2 лет назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2023-38745

около 2 лет назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2023-38745

около 2 лет назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered ...

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-9hpj-m9v9-5wvw

около 2 лет назад

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
EPSS: Низкий
redos логотип

ROS-20241015-01

11 месяцев назад

Множественные уязвимости pandoc

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2024-08375

около 2 лет назад

Уязвимость библиотеки преобразования форматов разметки Pandoc языка программирования Haskell, позволяющая нарушителю создавать или перезаписывать произвольные файлы в системе

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-38745

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-38745

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-38745

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-38745

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered ...

CVSS3: 6.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-9hpj-m9v9-5wvw

Pandoc before 3.1.6 allows arbitrary file write: this can be triggered by providing a crafted image element in the input when generating files via the --extract-media option or outputting to PDF format. This allows an attacker to create or overwrite arbitrary files, depending on the privileges of the process running Pandoc. It only affects systems that pass untrusted user input to Pandoc and allow Pandoc to be used to produce a PDF or with the --extract-media option. NOTE: this issue exists because of an incomplete fix for CVE-2023-35936 (failure to properly account for double encoded path names).

CVSS3: 6.3
0%
Низкий
около 2 лет назад
redos логотип
ROS-20241015-01

Множественные уязвимости pandoc

CVSS3: 6.3
11 месяцев назад
fstec логотип
BDU:2024-08375

Уязвимость библиотеки преобразования форматов разметки Pandoc языка программирования Haskell, позволяющая нарушителю создавать или перезаписывать произвольные файлы в системе

CVSS3: 6.3
0%
Низкий
около 2 лет назад

Уязвимостей на страницу