Show filters
91 Total Results
Displaying 31-40 of 91
Sort by:
Attacker Value
Unknown

CVE-2022-40264

Disclosure Date: December 14, 2022 (last updated February 24, 2025)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ICONICS/Mitsubishi Electric GENESIS64 versions 10.96 to 10.97.2 allows an unauthenticated attacker to create, tamper with or destroy arbitrary files by getting a legitimate user import a project package file crafted by the attacker.
Attacker Value
Unknown

CVE-2022-36603

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
InnoSilicon T3T+ t2t+_soc_20190911_151433.swu was discovered to contain a remote code execution (RCE) vulnerability in the checkUrl function.
Attacker Value
Unknown

CVE-2022-36602

Disclosure Date: September 01, 2022 (last updated October 08, 2023)
InnoSilicon A10 a10_20200924_120556 was discovered to contain a remote code execution (RCE) vulnerability in the setPlatformAPI function.
Attacker Value
Unknown

CVE-2022-33320

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes.
Attacker Value
Unknown

CVE-2022-33319

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
Out-of-bounds Read vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to disclose information on memory or cause a Denial of Service (DoS) condition by sending specially crafted packets to the GENESIS64 server.
Attacker Value
Unknown

CVE-2022-33318

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64 server.
Attacker Value
Unknown

CVE-2022-33317

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
Inclusion of Functionality from Untrusted Control Sphere vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious script codes.
Attacker Value
Unknown

CVE-2022-33316

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes.
Attacker Value
Unknown

CVE-2022-33315

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes.
Attacker Value
Unknown

CVE-2022-29834

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ICONICS GENESIS64 versions 10.97 to 10.97.1 allows a remote unauthenticated attacker to access to arbitrary files in the GENESIS64 server and disclose information stored in the files by embedding a malicious URL parameter in the URL of the monitoring screen delivered to the GENESIS64 mobile monitoring application and accessing the monitoring screen.