Логотип exploitDog
bind:CVE-2023-30801
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-30801

Количество 7

Количество 7

ubuntu логотип

CVE-2023-30801

около 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2023-30801

около 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-30801

около 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default crede ...

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2023:0391-1

почти 2 года назад

Security update for libtorrent-rasterbar, qbittorrent

EPSS: Низкий
redos логотип

ROS-20240505-03

больше 1 года назад

Уязвимость qbittorrent

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-vchq-5hmx-6hmp

около 2 лет назад

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2024-02758

около 2 лет назад

Уязвимость кросс-платформенный BitTorrent клиента qBittorrent, связанная с использованием жестко запрограммированных учетных данных, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-30801

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
1%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-30801

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
1%
Низкий
около 2 лет назад
debian логотип
CVE-2023-30801

All versions of the qBittorrent client through 4.5.5 use default crede ...

CVSS3: 9.8
1%
Низкий
около 2 лет назад
suse-cvrf логотип
openSUSE-SU-2023:0391-1

Security update for libtorrent-rasterbar, qbittorrent

1%
Низкий
почти 2 года назад
redos логотип
ROS-20240505-03

Уязвимость qbittorrent

CVSS3: 9.8
1%
Низкий
больше 1 года назад
github логотип
GHSA-vchq-5hmx-6hmp

All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

CVSS3: 9.8
1%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-02758

Уязвимость кросс-платформенный BitTorrent клиента qBittorrent, связанная с использованием жестко запрограммированных учетных данных, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
1%
Низкий
около 2 лет назад

Уязвимостей на страницу