Логотип exploitDog
bind:CVE-2024-45256
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-45256

Количество 2

Количество 2

nvd логотип

CVE-2024-45256

больше 1 года назад

An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your Own Botnet) 2.0 allows attackers to overwrite SQLite databases and bypass authentication via an unauthenticated HTTP request with a crafted parameter. This occurs in file_add in api/files/routes.py.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-fw5q-5jr8-g3vh

больше 1 года назад

An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your Own Botnet) 2.0 allows attackers to overwrite SQLite databases and bypass authentication via an unauthenticated HTTP request with a crafted parameter. This occurs in file_add in api/files/routes.py.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-45256

An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your Own Botnet) 2.0 allows attackers to overwrite SQLite databases and bypass authentication via an unauthenticated HTTP request with a crafted parameter. This occurs in file_add in api/files/routes.py.

CVSS3: 9.8
51%
Средний
больше 1 года назад
github логотип
GHSA-fw5q-5jr8-g3vh

An arbitrary file write issue in the exfiltration endpoint in BYOB (Build Your Own Botnet) 2.0 allows attackers to overwrite SQLite databases and bypass authentication via an unauthenticated HTTP request with a crafted parameter. This occurs in file_add in api/files/routes.py.

CVSS3: 9.8
51%
Средний
больше 1 года назад

Уязвимостей на страницу