9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
codiad/codiad is vulnerable to remote code execution. The vulnerability exists due to the lack of sanitization of input.
CPE | Name | Operator | Version |
---|---|---|---|
codiad/codiad | eq | v1.3.6 | |
codiad/codiad | eq | v1.3.6 |
packetstormsecurity.com/files/162753/Codiad-2.8.4-Remote-Code-Execution.html
github.com/advisories/GHSA-v92m-hhhw-vv9v
github.com/Codiad/Codiad/commits/master
github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit
herolab.usd.de/en/security-advisories/
herolab.usd.de/security-advisories/usd-2019-0049/
www.exploit-db.com/exploits/49902
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P