Логотип exploitDog
bind:CVE-2024-47578
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-47578

Количество 3

Количество 3

nvd логотип

CVE-2024-47578

около 1 года назад

Adobe Document Service allows an attacker with administrator privileges to send a crafted request from a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. On successful exploitation, the attacker can read or modify any file and/or make the entire system unavailable.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-2vxm-9c9f-7q2m

около 1 года назад

Adobe Document Service allows an attacker with administrator privileges to send a crafted request from a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. On successful exploitation, the attacker can read or modify any file and/or make the entire system unavailable.

CVSS3: 9.1
EPSS: Низкий
fstec логотип

BDU:2024-11050

больше 1 года назад

Уязвимость компонента Adobe Document Service программного средства создания и развертывания веб-приложений SAP NetWeaver AS for Java, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-47578

Adobe Document Service allows an attacker with administrator privileges to send a crafted request from a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. On successful exploitation, the attacker can read or modify any file and/or make the entire system unavailable.

CVSS3: 9.1
0%
Низкий
около 1 года назад
github логотип
GHSA-2vxm-9c9f-7q2m

Adobe Document Service allows an attacker with administrator privileges to send a crafted request from a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. On successful exploitation, the attacker can read or modify any file and/or make the entire system unavailable.

CVSS3: 9.1
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-11050

Уязвимость компонента Adobe Document Service программного средства создания и развертывания веб-приложений SAP NetWeaver AS for Java, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 9.1
0%
Низкий
больше 1 года назад

Уязвимостей на страницу