Логотип exploitDog
bind:CVE-2023-50219
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-50219

Количество 3

Количество 3

nvd логотип

CVE-2023-50219

почти 2 года назад

Inductive Automation Ignition RunQuery Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The specific flaw exists within the RunQuery class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-21625.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-7x3x-hpgm-xpw8

почти 2 года назад

Inductive Automation Ignition RunQuery Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The specific flaw exists within the RunQuery class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-21625.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2024-00302

больше 2 лет назад

Уязвимость класса RunQuery программного обеспечения для промышленной автоматизации Inductive Automation Ignition, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-50219

Inductive Automation Ignition RunQuery Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The specific flaw exists within the RunQuery class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-21625.

CVSS3: 8.8
9%
Низкий
почти 2 года назад
github логотип
GHSA-7x3x-hpgm-xpw8

Inductive Automation Ignition RunQuery Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The specific flaw exists within the RunQuery class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-21625.

CVSS3: 8.8
9%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-00302

Уязвимость класса RunQuery программного обеспечения для промышленной автоматизации Inductive Automation Ignition, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
9%
Низкий
больше 2 лет назад

Уязвимостей на страницу