Логотип exploitDog
bind:CVE-2019-7323
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-7323

Количество 2

Количество 2

nvd логотип

CVE-2019-7323

около 7 лет назад

GUP (generic update process) in LightySoft LogMX before 7.4.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update. The update process relies on cleartext HTTP. The attacker could replace the LogMXUpdater.class file.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-cvx3-wgm2-px6g

больше 3 лет назад

GUP (generic update process) in LightySoft LogMX before 7.4.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update. The update process relies on cleartext HTTP. The attacker could replace the LogMXUpdater.class file.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-7323

GUP (generic update process) in LightySoft LogMX before 7.4.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update. The update process relies on cleartext HTTP. The attacker could replace the LogMXUpdater.class file.

CVSS3: 7.5
0%
Низкий
около 7 лет назад
github логотип
GHSA-cvx3-wgm2-px6g

GUP (generic update process) in LightySoft LogMX before 7.4.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update. The update process relies on cleartext HTTP. The attacker could replace the LogMXUpdater.class file.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу