Логотип exploitDog
bind:CVE-2025-3425
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-3425

Количество 3

Количество 3

nvd логотип

CVE-2025-3425

10 месяцев назад

The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the deserialization vulnerability. After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. This issue affects IntelliSpace Portal: 12 and prior.

EPSS: Низкий
github логотип

GHSA-m7f8-37g5-8r53

10 месяцев назад

The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the deserialization vulnerability. After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. This issue affects IntelliSpace Portal: 12 and prior.

EPSS: Низкий
fstec логотип

BDU:2025-04096

10 месяцев назад

Уязвимость технологии межпроцессной коммуникации.NET Remoting системы визуализации и анализа клинических данных на базе искусственного интеллекта IntelliSpace Portal, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-3425

The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the deserialization vulnerability. After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. This issue affects IntelliSpace Portal: 12 and prior.

3%
Низкий
10 месяцев назад
github логотип
GHSA-m7f8-37g5-8r53

The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the deserialization vulnerability. After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. This issue affects IntelliSpace Portal: 12 and prior.

3%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-04096

Уязвимость технологии межпроцессной коммуникации.NET Remoting системы визуализации и анализа клинических данных на базе искусственного интеллекта IntelliSpace Portal, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.1
3%
Низкий
10 месяцев назад

Уязвимостей на страницу