Логотип exploitDog
bind:CVE-2025-11697
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-11697

Количество 2

Количество 2

nvd логотип

CVE-2025-11697

3 месяца назад

A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.

EPSS: Низкий
github логотип

GHSA-j5j6-gp3m-h3vx

3 месяца назад

A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-11697

A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.

0%
Низкий
3 месяца назад
github логотип
GHSA-j5j6-gp3m-h3vx

A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.

0%
Низкий
3 месяца назад

Уязвимостей на страницу