CVE-2020-12500: P+F Comtrol RocketLinx Improper Authorizatio
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
Prion | Authorization | 15 Oct 202019:15 | – | prion |
CVE | CVE-2020-12500 | 15 Oct 202019:15 | – | cve |
NVD | CVE-2020-12500 | 15 Oct 202019:15 | – | nvd |
Packet Storm | Korenix CSRF / Backdoor Accounts / Command Injection / Missing Authentication | 1 Jun 202100:00 | – | packetstorm |
Packet Storm | Korenix Technology JetWave CSRF / Command Injection / Missing Authentication | 4 Feb 202200:00 | – | packetstorm |
0day.today | Korenix CSRF / Backdoor Accounts / Command Injection / Missing Authentication Vulnerabilities | 1 Jun 202100:00 | – | zdt |
0day.today | Korenix Technology JetWave CSRF / Command Injection / Missing Authentication Vulnerabilities | 5 Feb 202200:00 | – | zdt |
[
{
"product": "P+F Comtrol RocketLinx",
"vendor": "Pepperl+Fuchs",
"versions": [
{
"status": "affected",
"version": "ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510-XTE, ES9528/ES9528-XT all"
},
{
"lessThan": "2.1.1",
"status": "affected",
"version": "ES7510-XT",
"versionType": "custom"
},
{
"lessThan": "3.1.1",
"status": "affected",
"version": "ES8510",
"versionType": "custom"
}
]
},
{
"product": "JetNet",
"vendor": "Korenix",
"versions": [
{
"lessThanOrEqual": "V1.0",
"status": "affected",
"version": "5428G-20SFP",
"versionType": "custom"
},
{
"lessThanOrEqual": "V1.1",
"status": "affected",
"version": "5810G",
"versionType": "custom"
},
{
"lessThanOrEqual": "V2.3b",
"status": "affected",
"version": "4706F",
"versionType": "custom"
},
{
"lessThanOrEqual": "V3.0b",
"status": "affected",
"version": "4510",
"versionType": "custom"
},
{
"lessThan": "V1.6",
"status": "affected",
"version": "5310",
"versionType": "custom"
}
]
},
{
"product": "PMI-110-F2G",
"vendor": "Westermo",
"versions": [
{
"lessThan": "V1.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo