Логотип exploitDog
bind:CVE-2022-45092
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-45092

Количество 3

Количество 3

nvd логотип

CVE-2022-45092

около 3 лет назад

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially read and write arbitrary files from and to the device's file system. An attacker might leverage this to trigger remote code execution on the affected component.

CVSS3: 9.9
EPSS: Низкий
github логотип

GHSA-jpc4-x6x2-7pm8

около 3 лет назад

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially read and write arbitrary files from and to the device's file system. An attacker might leverage this to trigger remote code execution on the affected component.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-00168

около 3 лет назад

Уязвимость веб-интерфейса управления программного обеспечения для управления сетевой инфраструктурой SINEC INS (Infrastructure Network Services), позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-45092

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially read and write arbitrary files from and to the device's file system. An attacker might leverage this to trigger remote code execution on the affected component.

CVSS3: 9.9
4%
Низкий
около 3 лет назад
github логотип
GHSA-jpc4-x6x2-7pm8

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially read and write arbitrary files from and to the device's file system. An attacker might leverage this to trigger remote code execution on the affected component.

CVSS3: 8.8
4%
Низкий
около 3 лет назад
fstec логотип
BDU:2023-00168

Уязвимость веб-интерфейса управления программного обеспечения для управления сетевой инфраструктурой SINEC INS (Infrastructure Network Services), позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
4%
Низкий
около 3 лет назад

Уязвимостей на страницу