Логотип exploitDog
bind:CVE-2019-18288
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-18288

Количество 3

Количество 3

nvd логотип

CVE-2019-18288

около 6 лет назад

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with valid authentication at the RMI interface could be able to gain remote code execution through an unsecured file upload. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-qxjv-whw7-vp66

больше 3 лет назад

A vulnerability has been identified in SPPA-T3000 Application Server (All versions). An attacker with valid authentication at the RMI interface could be able to gain remote code execution through an unsecured file upload. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2020-02439

около 6 лет назад

Уязвимость сервера приложений системы управления Siemens SPPA-T3000, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-18288

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with valid authentication at the RMI interface could be able to gain remote code execution through an unsecured file upload. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 8.8
8%
Низкий
около 6 лет назад
github логотип
GHSA-qxjv-whw7-vp66

A vulnerability has been identified in SPPA-T3000 Application Server (All versions). An attacker with valid authentication at the RMI interface could be able to gain remote code execution through an unsecured file upload. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

CVSS3: 8.8
8%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02439

Уязвимость сервера приложений системы управления Siemens SPPA-T3000, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
8%
Низкий
около 6 лет назад

Уязвимостей на страницу