misstt123 oasys 1.0 /show image ଡିରେକ୍ଟୋରୀ ଟ୍ରାଭର୍ସାଲ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu misstt123 oasys 1.0 keessatti argameera. Miidhaan irra gahe is hojii image faayilii /show keessa. Dhugumatti jijjiirraa gara ଡିରେକ୍ଟୋରୀ ଟ୍ରାଭର୍ସାଲ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-22 si geessa. Beekumsi kun yeroo 04/16/2025 ifoomsifameera akka 10. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2025-3686 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Odeeffannoon kun rolling release fayyadama, kanaaf tamsaasa itti fufinsa qabu ni kenna. Kanaaf, odeeffannoon version miidhamte fi kan haaromfame hin argamu. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

2 ଆଡାପ୍ଟେସନ୍ · 88 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
04/16/2025 03:26 AM
ଅଦ୍ୟତନ 1/1
06/25/2025 09:20 PM
software_vendormisstt123misstt123
software_nameoasysoasys
software_version1.01.0
software_rollingrelease11
software_file/show/show
software_functionimageimage
vulnerability_cweCWE-22 (ଡିରେକ୍ଟୋରୀ ଟ୍ରାଭର୍ସାଲ)CWE-22 (ଡିରେକ୍ଟୋରୀ ଟ୍ରାଭର୍ସାଲ)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iNN
cvss3_vuldb_aNN
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_identifier1010
advisory_urlhttps://github.com/misstt123/oasys/issues/10https://github.com/misstt123/oasys/issues/10
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/misstt123/oasys/issues/10https://github.com/misstt123/oasys/issues/10
source_cveCVE-2025-3686CVE-2025-3686
cna_responsibleVulDBVulDB
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciPP
cvss2_vuldb_iiNN
cvss2_vuldb_aiNN
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viNN
cvss4_vuldb_vaNN
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore4.04.0
cvss2_vuldb_tempscore3.43.4
cvss3_vuldb_basescore4.34.3
cvss3_vuldb_tempscore3.93.9
cvss3_meta_basescore4.34.3
cvss3_meta_tempscore3.94.1
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
advisory_date1744754400 (04/16/2025)1744754400 (04/16/2025)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA vulnerability classified as problematic was found in misstt123 oasys 1.0. Affected by this vulnerability is the function image of the file /show. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
cve_nvd_summaryesSe encontró una vulnerabilidad clasificada como problemática en misstt123 oasys 1.0. Esta vulnerabilidad afecta la imagen de función del archivo /show. La manipulación provoca un Path Traversal. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado. Este producto no utiliza control de versiones. Por ello, no se dispone de información sobre las versiones afectadas y no afectadas.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viN
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.3
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iN
cvss3_cna_aN
cvss3_cna_basescore4.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiN
cvss2_cna_aiN
cvss2_cna_basescore4

Want to stay up to date on a daily basis?

Enable the mail alert feature now!