Логотип exploitDog
bind:CVE-2023-45852
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-45852

Количество 2

Количество 2

nvd логотип

CVE-2023-45852

больше 2 лет назад

In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-4j4f-q993-cr2r

больше 2 лет назад

In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-45852

In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.

CVSS3: 9.8
94%
Критический
больше 2 лет назад
github логотип
GHSA-4j4f-q993-cr2r

In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.

CVSS3: 9.8
94%
Критический
больше 2 лет назад

Уязвимостей на страницу