Логотип exploitDog
bind:CVE-2023-26455
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26455

Количество 2

Количество 2

nvd логотип

CVE-2023-26455

больше 2 лет назад

RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.

CVSS3: 5.6
EPSS: Низкий
github логотип

GHSA-9wv2-mrrp-v8g7

больше 2 лет назад

RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.

CVSS3: 5.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26455

RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.

CVSS3: 5.6
0%
Низкий
больше 2 лет назад
github логотип
GHSA-9wv2-mrrp-v8g7

RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.

CVSS3: 5.6
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу