Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vq7v-c9vx-j45h

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

EPSS

Процентиль: 71%
0.00682
Низкий

Связанные уязвимости

CVSS3: 7.8
nvd
больше 5 лет назад

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

CVSS3: 7.3
fstec
больше 5 лет назад

Уязвимость компонентов PC Worx, PC Worx Express программного пакета Automationworx Software Suite, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 71%
0.00682
Низкий