Логотип exploitDog
bind:CVE-2026-1413
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-1413

Количество 3

Количество 3

nvd логотип

CVE-2026-1413

15 дней назад

A vulnerability was found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function portValidate of the file /fort/ip_and_port/port_validate of the component HTTP POST Request Handler. Performing a manipulation of the argument port results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-38mq-gg8g-j53r

15 дней назад

A vulnerability was found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function portValidate of the file /fort/ip_and_port/port_validate of the component HTTP POST Request Handler. Performing a manipulation of the argument port results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2026-00992

29 дней назад

Уязвимость метода portValidate класса IpOrPortController системы управления ИТ-инфраструктурой и кибербезопасностью Sangfor Operation and Maintenance Security Management System (OSM), позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-1413

A vulnerability was found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function portValidate of the file /fort/ip_and_port/port_validate of the component HTTP POST Request Handler. Performing a manipulation of the argument port results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used.

CVSS3: 6.3
0%
Низкий
15 дней назад
github логотип
GHSA-38mq-gg8g-j53r

A vulnerability was found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function portValidate of the file /fort/ip_and_port/port_validate of the component HTTP POST Request Handler. Performing a manipulation of the argument port results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used.

CVSS3: 6.3
0%
Низкий
15 дней назад
fstec логотип
BDU:2026-00992

Уязвимость метода portValidate класса IpOrPortController системы управления ИТ-инфраструктурой и кибербезопасностью Sangfor Operation and Maintenance Security Management System (OSM), позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
0%
Низкий
29 дней назад

Уязвимостей на страницу