Логотип exploitDog
bind:CVE-2023-39461
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-39461

Количество 3

Количество 3

nvd логотип

CVE-2023-39461

почти 2 года назад

Triangle MicroWorks SCADA Data Gateway Event Log Improper Output Neutralization For Logs Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of event logs. The issue results from improper sanitization of log output. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-20535.

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-r8p9-94v3-7g9h

почти 2 года назад

Triangle MicroWorks SCADA Data Gateway Event Log Improper Output Neutralization For Logs Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of event logs. The issue results from improper sanitization of log output. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-20535.

CVSS3: 4.4
EPSS: Низкий
fstec логотип

BDU:2023-06527

почти 3 года назад

Уязвимость SCADA-системы SCADA Data Gateway (SDG), связанная с неправильной обработкой выходных данных для журналов регистрации, позволяющая нарушителю выполнять произвольный код

CVSS3: 4.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-39461

Triangle MicroWorks SCADA Data Gateway Event Log Improper Output Neutralization For Logs Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of event logs. The issue results from improper sanitization of log output. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-20535.

CVSS3: 4.4
0%
Низкий
почти 2 года назад
github логотип
GHSA-r8p9-94v3-7g9h

Triangle MicroWorks SCADA Data Gateway Event Log Improper Output Neutralization For Logs Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of event logs. The issue results from improper sanitization of log output. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-20535.

CVSS3: 4.4
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-06527

Уязвимость SCADA-системы SCADA Data Gateway (SDG), связанная с неправильной обработкой выходных данных для журналов регистрации, позволяющая нарушителю выполнять произвольный код

CVSS3: 4.4
0%
Низкий
почти 3 года назад

Уязвимостей на страницу