Логотип exploitDog
bind:CVE-2023-31465
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-31465

Количество 3

Количество 3

nvd логотип

CVE-2023-31465

больше 2 лет назад

An issue was discovered in FSMLabs TimeKeeper 8.0.17 through 8.0.28. By intercepting requests from various timekeeper streams, it is possible to find the getsamplebacklog call. Some query parameters are passed directly in the URL and named arg[x], with x an integer starting from 1; it is possible to modify arg[2] to insert Bash code that will be executed directly by the server.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-7xq6-44ph-rwqf

больше 2 лет назад

An issue was discovered in FSMLabs TimeKeeper 8.0.17 through 8.0.28. By intercepting requests from various timekeeper streams, it is possible to find the getsamplebacklog call. Some query parameters are passed directly in the URL and named arg[x], with x an integer starting from 1; it is possible to modify arg[2] to insert Bash code that will be executed directly by the server.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2023-07997

больше 2 лет назад

Уязвимость программного обеспечения синхронизации времени FSMLabs TimeKeeper, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-31465

An issue was discovered in FSMLabs TimeKeeper 8.0.17 through 8.0.28. By intercepting requests from various timekeeper streams, it is possible to find the getsamplebacklog call. Some query parameters are passed directly in the URL and named arg[x], with x an integer starting from 1; it is possible to modify arg[2] to insert Bash code that will be executed directly by the server.

CVSS3: 9.8
91%
Критический
больше 2 лет назад
github логотип
GHSA-7xq6-44ph-rwqf

An issue was discovered in FSMLabs TimeKeeper 8.0.17 through 8.0.28. By intercepting requests from various timekeeper streams, it is possible to find the getsamplebacklog call. Some query parameters are passed directly in the URL and named arg[x], with x an integer starting from 1; it is possible to modify arg[2] to insert Bash code that will be executed directly by the server.

CVSS3: 9.8
91%
Критический
больше 2 лет назад
fstec логотип
BDU:2023-07997

Уязвимость программного обеспечения синхронизации времени FSMLabs TimeKeeper, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
91%
Критический
больше 2 лет назад

Уязвимостей на страницу