Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Moderate
OpenSSL TLS Server Crash (NULL pointer dereference) — CVE-2021-3449
Disclosure Date: March 25, 2021 (last updated November 08, 2023)
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
4
Attacker Value
Unknown
CVE-2021-44695
Disclosure Date: December 13, 2022 (last updated October 08, 2023)
Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.
0
Attacker Value
Unknown
CVE-2021-44694
Disclosure Date: December 13, 2022 (last updated October 08, 2023)
Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.
0
Attacker Value
Unknown
CVE-2021-44693
Disclosure Date: December 13, 2022 (last updated October 08, 2023)
Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.
0
Attacker Value
Unknown
CVE-2021-40365
Disclosure Date: December 13, 2022 (last updated October 08, 2023)
Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.
0
Attacker Value
Unknown
CVE-2022-30694
Disclosure Date: November 08, 2022 (last updated December 22, 2024)
The login endpoint /FormLogin in affected web services does not apply proper origin checking.
This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack.
0
Attacker Value
Unknown
CVE-2013-0700
Disclosure Date: April 22, 2013 (last updated October 05, 2023)
Siemens SIMATIC S7-1200 PLCs 2.x and 3.x allow remote attackers to cause a denial of service (defect-mode transition and control outage) via crafted packets to TCP port 102 (aka the ISO-TSAP port).
0
Attacker Value
Unknown
CVE-2013-2780
Disclosure Date: April 22, 2013 (last updated October 05, 2023)
Siemens SIMATIC S7-1200 PLCs 2.x and 3.x allow remote attackers to cause a denial of service (defect-mode transition and control outage) via crafted packets to UDP port 161 (aka the SNMP port).
0
Attacker Value
Unknown
CVE-2012-3040
Disclosure Date: October 10, 2012 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in the web server on Siemens SIMATIC S7-1200 PLCs 2.x through 3.0.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URI.
0
Attacker Value
Unknown
CVE-2012-3037
Disclosure Date: September 25, 2012 (last updated October 05, 2023)
The Siemens SIMATIC S7-1200 2.x PLC does not properly protect the private key of the SIMATIC CONTROLLER Certification Authority certificate, which allows remote attackers to spoof the S7-1200 web server by using this key to create a forged certificate.
0