Show filters
84 Total Results
Displaying 21-30 of 84
Sort by:
Attacker Value
Unknown
CVE-2023-2161
Disclosure Date: May 16, 2023 (last updated October 08, 2023)
A CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that
could cause unauthorized read access to the file system when a malicious configuration file is
loaded on to the software by a local user.
0
Attacker Value
Unknown
CVE-2022-37013
Disclosure Date: March 29, 2023 (last updated October 08, 2023)
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server 1.7.6-537 [with vendor rollup]. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of certificates. A crafted certificate can force the server into an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-17203.
0
Attacker Value
Unknown
CVE-2022-37012
Disclosure Date: March 29, 2023 (last updated October 08, 2023)
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server 1.7.6-537. Authentication is not required to exploit this vulnerability. The specific flaw exists within the OpcUa_SecureListener_ProcessSessionCallRequest method. A crafted OPC UA message can force the server to incorrectly update a reference count. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-16927.
0
Attacker Value
Unknown
CVE-2022-2848
Disclosure Date: March 29, 2023 (last updated October 08, 2023)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486.
0
Attacker Value
Unknown
CVE-2022-2825
Disclosure Date: March 29, 2023 (last updated October 08, 2023)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-18411.
0
Attacker Value
Unknown
CVE-2022-37453
Disclosure Date: October 20, 2022 (last updated October 08, 2023)
An issue was discovered in Softing OPC UA C++ SDK before 6.10. A buffer overflow or an excess allocation happens due to unchecked array and matrix bounds in structure data types.
0
Attacker Value
Unknown
CVE-2022-2547
Disclosure Date: August 17, 2022 (last updated October 08, 2023)
A crafted HTTP packet without a content-type header can create a denial-of-service condition in Softing Secure Integration Server V1.22.
0
Attacker Value
Unknown
CVE-2022-2338
Disclosure Date: August 17, 2022 (last updated October 08, 2023)
Softing Secure Integration Server V1.22 is vulnerable to authentication bypass via a machine-in-the-middle attack. The default the administration interface is accessible via plaintext HTTP protocol, facilitating the attack. The HTTP request may contain the session cookie in the request, which may be captured for use in authenticating to the server.
0
Attacker Value
Unknown
CVE-2022-2337
Disclosure Date: August 17, 2022 (last updated October 08, 2023)
A crafted HTTP packet with a missing HTTP URI can create a denial-of-service condition in Softing Secure Integration Server V1.22.
0
Attacker Value
Unknown
CVE-2022-2336
Disclosure Date: August 17, 2022 (last updated October 08, 2023)
Softing Secure Integration Server, edgeConnector, and edgeAggregator software ships with the default administrator credentials as `admin` and password as `admin`. This allows Softing to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the `admin` password. There is no warning or prompt to ask the user to change the default password, and to change the password, many steps are required.
0