Логотип exploitDog
bind:CVE-2013-0655
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-0655

Количество 2

Количество 2

nvd логотип

CVE-2013-0655

около 13 лет назад

The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.

CVSS2: 9.3
EPSS: Низкий
github логотип

GHSA-8q56-7r9c-2j9q

больше 3 лет назад

The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-0655

The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.

CVSS2: 9.3
1%
Низкий
около 13 лет назад
github логотип
GHSA-8q56-7r9c-2j9q

The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу