Логотип exploitDog
bind:CVE-2023-39468
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-39468

Количество 3

Количество 3

nvd логотип

CVE-2023-39468

почти 2 года назад

Triangle MicroWorks SCADA Data Gateway DbasSectorFileToExecuteOnReset Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of DbasSectorFileToExecuteOnReset parameter. The issue results from an exposed dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20799.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-4p7j-rqc6-ff4w

почти 2 года назад

Triangle MicroWorks SCADA Data Gateway DbasSectorFileToExecuteOnReset Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of DbasSectorFileToExecuteOnReset parameter. The issue results from an exposed dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20799.

CVSS3: 7.2
EPSS: Низкий
fstec логотип

BDU:2023-04694

больше 2 лет назад

Уязвимость функции DbasSectorFileToExecuteOnReset CADA-системы SCADA Data Gateway (SDG), позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-39468

Triangle MicroWorks SCADA Data Gateway DbasSectorFileToExecuteOnReset Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of DbasSectorFileToExecuteOnReset parameter. The issue results from an exposed dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20799.

CVSS3: 7.2
1%
Низкий
почти 2 года назад
github логотип
GHSA-4p7j-rqc6-ff4w

Triangle MicroWorks SCADA Data Gateway DbasSectorFileToExecuteOnReset Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of DbasSectorFileToExecuteOnReset parameter. The issue results from an exposed dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20799.

CVSS3: 7.2
1%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-04694

Уязвимость функции DbasSectorFileToExecuteOnReset CADA-системы SCADA Data Gateway (SDG), позволяющая нарушителю выполнить произвольный код

CVSS3: 7.2
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу