Show filters
17 Total Results
Displaying 1-10 of 17
Sort by:
Attacker Value
High

CVE-2022-22965

Disclosure Date: April 01, 2022 (last updated October 07, 2023)
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.
Attacker Value
Unknown

CVE-2002-20001

Disclosure Date: November 11, 2021 (last updated February 23, 2025)
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
Attacker Value
Unknown

CVE-2021-27413

Disclosure Date: May 13, 2021 (last updated February 22, 2025)
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
Attacker Value
Unknown

CVE-2020-27259

Disclosure Date: January 07, 2021 (last updated February 22, 2025)
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.
Attacker Value
Unknown

CVE-2020-27261

Disclosure Date: January 07, 2021 (last updated February 22, 2025)
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
Attacker Value
Unknown

CVE-2020-27257

Disclosure Date: January 07, 2021 (last updated February 22, 2025)
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
Attacker Value
Unknown

CVE-2018-20026

Disclosure Date: February 19, 2019 (last updated November 27, 2024)
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
Attacker Value
Unknown

CVE-2018-18993

Disclosure Date: December 04, 2018 (last updated November 27, 2024)
Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application.
Attacker Value
Unknown

CVE-2018-18989

Disclosure Date: December 04, 2018 (last updated November 27, 2024)
In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
0
Attacker Value
Unknown

CVE-2018-14907

Disclosure Date: August 03, 2018 (last updated November 27, 2024)
The Web server in 3CX version 15.5.8801.3 is vulnerable to Information Leakage, because of improper error handling in Stack traces, as demonstrated by discovering a full pathname.
0