Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mxpx-q7g4-6q9c

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

Remote file inclusion allows an attacker to craft a specific URL referencing the Schneider Electric Modicon BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, or BMXP342030H PLC web server, which, when launched, will result in the browser redirecting to a remote file via a Java script loaded with the web page.

Remote file inclusion allows an attacker to craft a specific URL referencing the Schneider Electric Modicon BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, or BMXP342030H PLC web server, which, when launched, will result in the browser redirecting to a remote file via a Java script loaded with the web page.

EPSS

Процентиль: 41%
0.00185
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 5.4
nvd
почти 7 лет назад

Remote file inclusion allows an attacker to craft a specific URL referencing the Schneider Electric Modicon BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, or BMXP342030H PLC web server, which, when launched, will result in the browser redirecting to a remote file via a Java script loaded with the web page.

EPSS

Процентиль: 41%
0.00185
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-20