Логотип exploitDog
bind:CVE-2025-13791
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-13791

Количество 3

Количество 3

nvd логотип

CVE-2025-13791

2 месяца назад

A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-r48m-vcgj-jw7q

2 месяца назад

A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2025-14906

3 месяца назад

Уязвимость функции Common.getHomeDir() многоплатформенного веб-решения для создания Scada-систем Scada-LTS, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-13791

A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
0%
Низкий
2 месяца назад
github логотип
GHSA-r48m-vcgj-jw7q

A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
0%
Низкий
2 месяца назад
fstec логотип
BDU:2025-14906

Уязвимость функции Common.getHomeDir() многоплатформенного веб-решения для создания Scada-систем Scada-LTS, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

CVSS3: 8.8
0%
Низкий
3 месяца назад

Уязвимостей на страницу