Логотип exploitDog
bind:CVE-2020-25176
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-25176

Количество 3

Количество 3

nvd логотип

CVE-2020-25176

почти 4 года назад

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-fg53-m5qv-8qwq

почти 4 года назад

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-03570

больше 4 лет назад

Уязвимость компонента eXchange Layer (IXL) среды разработки приложений для программируемых логических контроллеров ISaGRAF Runtime Rockwell Automation, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-25176

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

CVSS3: 9.1
3%
Низкий
почти 4 года назад
github логотип
GHSA-fg53-m5qv-8qwq

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

CVSS3: 9.8
3%
Низкий
почти 4 года назад
fstec логотип
BDU:2023-03570

Уязвимость компонента eXchange Layer (IXL) среды разработки приложений для программируемых логических контроллеров ISaGRAF Runtime Rockwell Automation, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
3%
Низкий
больше 4 лет назад

Уязвимостей на страницу