The product does not validate any query towards persistent
data, resulting in a risk of injection attacks.
References
Link | Resource |
---|---|
https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch | Vendor Advisory |
Configurations
History
05 Sep 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-943 |
28 Aug 2024, 16:25
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch - Vendor Advisory | |
First Time |
Hitachienergy
Hitachienergy microscada X Sys600 |
27 Aug 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-27 13:15
Updated : 2024-09-05 09:15
NVD link : CVE-2024-4872
Mitre link : CVE-2024-4872
CVE.ORG link : CVE-2024-4872
JSON object : View
Products Affected
hitachienergy
- microscada_x_sys600