Логотип exploitDog
bind:CVE-2025-34393
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34393

Количество 2

Количество 2

nvd логотип

CVE-2025-34393

2 месяца назад

Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not correctly verify the name of an attacker-controlled WSDL service, leading to insecure reflection. This can result in remote code execution through either invocation of arbitrary methods or deserialization of untrusted types.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-x3jp-wfm4-c9mv

2 месяца назад

Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not correctly verify the name of an attacker-controlled WSDL service, leading to insecure reflection. This can result in remote code execution through either invocation of arbitrary methods or deserialization of untrusted types.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34393

Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not correctly verify the name of an attacker-controlled WSDL service, leading to insecure reflection. This can result in remote code execution through either invocation of arbitrary methods or deserialization of untrusted types.

CVSS3: 9.8
0%
Низкий
2 месяца назад
github логотип
GHSA-x3jp-wfm4-c9mv

Barracuda Service Center, as implemented in the RMM solution, in versions prior to 2025.1.1, does not correctly verify the name of an attacker-controlled WSDL service, leading to insecure reflection. This can result in remote code execution through either invocation of arbitrary methods or deserialization of untrusted types.

CVSS3: 9.8
0%
Низкий
2 месяца назад

Уязвимостей на страницу