Логотип exploitDog
bind:CVE-2023-25266
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-25266

Количество 2

Количество 2

nvd логотип

CVE-2023-25266

почти 3 года назад

An issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE).

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-7mjw-898c-2hq9

почти 3 года назад

An issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE).

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-25266

An issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE).

CVSS3: 8.8
2%
Низкий
почти 3 года назад
github логотип
GHSA-7mjw-898c-2hq9

An issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE).

CVSS3: 8.8
2%
Низкий
почти 3 года назад

Уязвимостей на страницу