Логотип exploitDog
bind:CVE-2021-41579
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-41579

Количество 2

Количество 2

nvd логотип

CVE-2021-41579

больше 4 лет назад

LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-q78c-pv4h-fqw6

больше 3 лет назад

LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-41579

LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution.

CVSS3: 7.8
1%
Низкий
больше 4 лет назад
github логотип
GHSA-q78c-pv4h-fqw6

LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу