Логотип exploitDog
bind:CVE-2023-38323
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-38323

Количество 4

Количество 4

ubuntu логотип

CVE-2023-38323

около 2 лет назад

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2023-38323

около 2 лет назад

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-38323

около 2 лет назад

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-c69w-p7cc-6h7c

около 2 лет назад

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-38323

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVSS3: 9.8
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-38323

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVSS3: 9.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-38323

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize ...

CVSS3: 9.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-c69w-p7cc-6h7c

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVSS3: 9.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу