Show filters
21 Total Results
Displaying 1-10 of 21
Sort by:
Attacker Value
Unknown

CVE-2024-11220

Disclosure Date: December 06, 2024 (last updated January 24, 2025)
A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation.
Attacker Value
Unknown

CVE-2024-27201

Disclosure Date: April 03, 2024 (last updated January 24, 2025)
An improper input validation vulnerability exists in the OAS Engine User Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to unexpected data in the configuration. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2024-24976

Disclosure Date: April 03, 2024 (last updated January 24, 2025)
A denial of service vulnerability exists in the OAS Engine File Data Source Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can cause the running program to stop. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2024-22178

Disclosure Date: April 03, 2024 (last updated January 24, 2025)
A file write vulnerability exists in the OAS Engine Save Security Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2024-21870

Disclosure Date: April 03, 2024 (last updated January 24, 2025)
A file write vulnerability exists in the OAS Engine Tags Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2023-35124

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
An information disclosure vulnerability exists in the OAS Engine configuration management functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to a disclosure of sensitive information. An attacker can send a sequence of requests to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-34998

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
An authentication bypass vulnerability exists in the OAS Engine functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to arbitrary authentication. An attacker can sniff network traffic to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-34994

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
An improper resource allocation vulnerability exists in the OAS Engine configuration management functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to creation of an arbitrary directory. An attacker can send a sequence of requests to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-34353

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
An authentication bypass vulnerability exists in the OAS Engine authentication functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted network sniffing can lead to decryption of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.
Attacker Value
Unknown

CVE-2023-34317

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
An improper input validation vulnerability exists in the OAS Engine User Creation functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to unexpected data in the configuration. An attacker can send a sequence of requests to trigger this vulnerability.