Логотип exploitDog
bind:CVE-2018-5702
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-5702

Количество 4

Количество 4

ubuntu логотип

CVE-2018-5702

около 8 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

CVSS3: 8.8
EPSS: Средний
nvd логотип

CVE-2018-5702

около 8 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

CVSS3: 8.8
EPSS: Средний
debian логотип

CVE-2018-5702

около 8 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which i ...

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-6q4w-fhcp-mhw6

больше 3 лет назад

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

CVSS3: 8.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-5702

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

CVSS3: 8.8
27%
Средний
около 8 лет назад
nvd логотип
CVE-2018-5702

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

CVSS3: 8.8
27%
Средний
около 8 лет назад
debian логотип
CVE-2018-5702

Transmission through 2.92 relies on X-Transmission-Session-Id (which i ...

CVSS3: 8.8
27%
Средний
около 8 лет назад
github логотип
GHSA-6q4w-fhcp-mhw6

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack.

CVSS3: 8.8
27%
Средний
больше 3 лет назад

Уязвимостей на страницу