Логотип exploitDog
bind:CVE-2025-51463
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-51463

Количество 2

Количество 2

nvd логотип

CVE-2025-51463

7 месяцев назад

Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-6gj6-5cm3-g43x

7 месяцев назад

Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.

CVSS3: 7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-51463

Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.

CVSS3: 7
0%
Низкий
7 месяцев назад
github логотип
GHSA-6gj6-5cm3-g43x

Path Traversal in restore_run_backup() in AIM 3.28.0 allows remote attackers to write arbitrary files to the server's filesystem via a crafted backup tar file submitted to the run_instruction API, which is extracted without path validation during restoration.

CVSS3: 7
0%
Низкий
7 месяцев назад

Уязвимостей на страницу