Логотип exploitDog
bind:CVE-2012-2596
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-2596

Количество 2

Количество 2

nvd логотип

CVE-2012-2596

больше 13 лет назад

The XPath functionality in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 does not properly handle special characters in parameters, which allows remote authenticated users to read or modify settings via a crafted URL, related to an "XML injection" attack.

CVSS2: 5.5
EPSS: Низкий
github логотип

GHSA-8h44-xxg3-9447

больше 3 лет назад

The XPath functionality in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 does not properly handle special characters in parameters, which allows remote authenticated users to read or modify settings via a crafted URL, related to an "XML injection" attack.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2012-2596

The XPath functionality in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 does not properly handle special characters in parameters, which allows remote authenticated users to read or modify settings via a crafted URL, related to an "XML injection" attack.

CVSS2: 5.5
0%
Низкий
больше 13 лет назад
github логотип
GHSA-8h44-xxg3-9447

The XPath functionality in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 does not properly handle special characters in parameters, which allows remote authenticated users to read or modify settings via a crafted URL, related to an "XML injection" attack.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу