Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-844m-rhr6-873v

Опубликовано: 22 июл. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in flow computer and remote controller products of ABB ( RMC-100 (Standard), RMC-100-LITE, XIO, XFCG5 , XRCG5 , uFLOG5 , UDC) allows an attacker who successfully exploited this vulnerability could insert and run arbitrary code in an affected system node.

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in flow computer and remote controller products of ABB ( RMC-100 (Standard), RMC-100-LITE, XIO, XFCG5 , XRCG5 , uFLOG5 , UDC) allows an attacker who successfully exploited this vulnerability could insert and run arbitrary code in an affected system node.

EPSS

Процентиль: 84%
0.02251
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 8.1
nvd
больше 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in flow computer and remote controller products of ABB ( RMC-100 (Standard), RMC-100-LITE, XIO, XFCG5 , XRCG5 , uFLOG5 , UDC) allows an attacker who successfully exploited this vulnerability could insert and run arbitrary code in an affected system node.

CVSS3: 9.8
fstec
больше 3 лет назад

Уязвимость реализации tcp-протокола Totalflow микропрограммного обеспечения контроллеров ABB RMC-100, RMC-100-LITE, XIO, XFCG5, XRCG5, uFLOG5, UDC, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 84%
0.02251
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-22