Логотип exploitDog
bind:CVE-2018-13810
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-13810

Количество 3

Количество 3

nvd логотип

CVE-2018-13810

больше 6 лет назад

A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-23g5-r56j-rmx3

около 3 лет назад

A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2019-03005

больше 7 лет назад

Уязвимость микропрограммного обеспечения коммуникационного модуля Siemens CP, связанная с межсайтовой фальсификацией запросов, позволяющая нарушителю произвести атаку

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-13810

A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known.

CVSS3: 6.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-23g5-r56j-rmx3

A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-03005

Уязвимость микропрограммного обеспечения коммуникационного модуля Siemens CP, связанная с межсайтовой фальсификацией запросов, позволяющая нарушителю произвести атаку

CVSS3: 4.3
0%
Низкий
больше 7 лет назад

Уязвимостей на страницу