Логотип exploitDog
bind:CVE-2025-54769
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-54769

Количество 2

Количество 2

nvd логотип

CVE-2025-54769

7 месяцев назад

An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-w9qq-jmgq-wfv5

7 месяцев назад

An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-54769

An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.

CVSS3: 8.8
3%
Низкий
7 месяцев назад
github логотип
GHSA-w9qq-jmgq-wfv5

An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.

CVSS3: 8.8
3%
Низкий
7 месяцев назад

Уязвимостей на страницу