Логотип exploitDog
bind:CVE-2025-34392
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34392

Количество 2

Количество 2

nvd логотип

CVE-2025-34392

2 месяца назад

Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not verify the URL defined in an attacker-controlled WSDL that is later loaded by the application. This can lead to arbitrary file write and remote code execution via webshell upload.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-r5wc-8hr9-ggp3

2 месяца назад

Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not verify the URL defined in an attacker-controlled WSDL that is later loaded by the application. This can lead to arbitrary file write and remote code execution via webshell upload.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34392

Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not verify the URL defined in an attacker-controlled WSDL that is later loaded by the application. This can lead to arbitrary file write and remote code execution via webshell upload.

CVSS3: 9.8
1%
Низкий
2 месяца назад
github логотип
GHSA-r5wc-8hr9-ggp3

Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not verify the URL defined in an attacker-controlled WSDL that is later loaded by the application. This can lead to arbitrary file write and remote code execution via webshell upload.

CVSS3: 9.8
1%
Низкий
2 месяца назад

Уязвимостей на страницу