Логотип exploitDog
bind:CVE-2026-1414
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-1414

Количество 3

Количество 3

nvd логотип

CVE-2026-1414

15 дней назад

A vulnerability was determined in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler. Executing a manipulation of the argument fortEquipmentIp can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-w2x9-wvhh-7qg3

15 дней назад

A vulnerability was determined in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler. Executing a manipulation of the argument fortEquipmentIp can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2026-00993

29 дней назад

Уязвимость метода getInformation класса FortEquipmentNodeController системы управления ИТ-инфраструктурой и кибербезопасностью Sangfor Operation and Maintenance Security Management System (OSM), позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-1414

A vulnerability was determined in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler. Executing a manipulation of the argument fortEquipmentIp can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

CVSS3: 6.3
0%
Низкий
15 дней назад
github логотип
GHSA-w2x9-wvhh-7qg3

A vulnerability was determined in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler. Executing a manipulation of the argument fortEquipmentIp can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

CVSS3: 6.3
0%
Низкий
15 дней назад
fstec логотип
BDU:2026-00993

Уязвимость метода getInformation класса FortEquipmentNodeController системы управления ИТ-инфраструктурой и кибербезопасностью Sangfor Operation and Maintenance Security Management System (OSM), позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
0%
Низкий
29 дней назад

Уязвимостей на страницу