CVE-2018-10600

SEL AcSELerator Architect version 2.2.24.0 and prior allows unsanitized input to be passed to the XML parser, which may allow disclosure and retrieval of arbitrary data, arbitrary code execution (in certain situations on specific platforms), and denial of service attacks.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-191-02 Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-191-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:selinc:acselerator_architect:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:41

Type Values Removed Values Added
References () https://ics-cert.us-cert.gov/advisories/ICSA-18-191-02 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-18-191-02 - Third Party Advisory, US Government Resource

Information

Published : 2018-07-24 13:29

Updated : 2024-11-21 03:41


NVD link : CVE-2018-10600

Mitre link : CVE-2018-10600

CVE.ORG link : CVE-2018-10600


JSON object : View

Products Affected

selinc

  • acselerator_architect
CWE
CWE-611

Improper Restriction of XML External Entity Reference