Show filters
213 Total Results
Displaying 51-60 of 213
Sort by:
Attacker Value
Unknown
CVE-2021-22802
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in remote code execution due to missing length check on user supplied data, when a constructed message is received on the network. Affected Product: Interactive Graphical SCADA System Data Collector (dc.exe) (V15.0.0.21243 and prior)
0
Attacker Value
Unknown
CVE-2022-24317
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A CWE-862: Missing Authorization vulnerability exists that could cause information exposure when an attacker sends a specific message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
0
Attacker Value
Unknown
CVE-2022-24316
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A CWE-665: Improper Initialization vulnerability exists that could cause information exposure when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
0
Attacker Value
Unknown
CVE-2022-24315
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service when an attacker repeatedly sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
0
Attacker Value
Unknown
CVE-2022-24314
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A CWE-125: Out-of-bounds Read vulnerability exists that could cause memory leaks potentially resulting in denial of service when an attacker repeatedly sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
0
Attacker Value
Unknown
CVE-2022-24313
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
0
Attacker Value
Unknown
CVE-2022-24312
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists that could cause modification of an existing file by adding at end of file or create a new file in the context of the Data Server potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
0
Attacker Value
Unknown
CVE-2022-24311
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists that could cause modification of an existing file by inserting at beginning of file or create a new file in the context of the Data Server potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
0
Attacker Value
Unknown
CVE-2022-24310
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A CWE-190: Integer Overflow or Wraparound vulnerability exists that could cause heap-based buffer overflow, leading to denial of service and potentially remote code execution when an attacker sends multiple specially crafted messages. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
0
Attacker Value
Unknown
CVE-2021-44832
Disclosure Date: December 28, 2021 (last updated February 23, 2025)
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
0