Логотип exploitDog
bind:CVE-2023-51595
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-51595

Количество 3

Количество 3

nvd логотип

CVE-2023-51595

почти 2 года назад

Voltronic Power ViewPower Pro selectDeviceListBy SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the selectDeviceListBy method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22163.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-3wx7-rcmj-m6wf

почти 2 года назад

Voltronic Power ViewPower Pro selectDeviceListBy SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the selectDeviceListBy method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22163.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2024-00152

около 2 лет назад

Уязвимость метода selectDeviceListBy программного обеспечения для управления источниками бесперебойного питания Voltronic Power ViewPower, позволяющая нарушителю выполнять произвольные SQL-запросы

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-51595

Voltronic Power ViewPower Pro selectDeviceListBy SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the selectDeviceListBy method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22163.

CVSS3: 9.8
36%
Средний
почти 2 года назад
github логотип
GHSA-3wx7-rcmj-m6wf

Voltronic Power ViewPower Pro selectDeviceListBy SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the selectDeviceListBy method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22163.

CVSS3: 9.8
36%
Средний
почти 2 года назад
fstec логотип
BDU:2024-00152

Уязвимость метода selectDeviceListBy программного обеспечения для управления источниками бесперебойного питания Voltronic Power ViewPower, позволяющая нарушителю выполнять произвольные SQL-запросы

CVSS3: 9.8
36%
Средний
около 2 лет назад

Уязвимостей на страницу