Логотип exploitDog
bind:CVE-2026-23535
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-23535

Количество 4

Количество 4

ubuntu логотип

CVE-2026-23535

23 дня назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

CVSS3: 8
EPSS: Низкий
nvd логотип

CVE-2026-23535

23 дня назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

CVSS3: 8
EPSS: Низкий
debian логотип

CVE-2026-23535

23 дня назад

wlc is a Weblate command-line client using Weblate's REST API. Prior t ...

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-mmwx-79f6-67jg

23 дня назад

Weblate wlc path traversal vulnerability: Unsanitized API slugs in download command

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-23535

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

CVSS3: 8
0%
Низкий
23 дня назад
nvd логотип
CVE-2026-23535

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

CVSS3: 8
0%
Низкий
23 дня назад
debian логотип
CVE-2026-23535

wlc is a Weblate command-line client using Weblate's REST API. Prior t ...

CVSS3: 8
0%
Низкий
23 дня назад
github логотип
GHSA-mmwx-79f6-67jg

Weblate wlc path traversal vulnerability: Unsanitized API slugs in download command

CVSS3: 8
0%
Низкий
23 дня назад

Уязвимостей на страницу