Page 11 of 101 results (0.014 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service). Un Consumo No Controlado de Recursos puede ser explotado para causar que las HMIs Phoenix Contact versiones BTP 2043W, BTP 2070W y BTP 2102W en todas las versiones dejen de responder y no actualicen con precisión el contenido de la pantalla (Denegación de Servicio) • https://cert.vde.com/en-us/advisories/vde-2020-047 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

In PHOENIX CONTACT PLCnext Engineer version 2020.3.1 and earlier an improper path sanitation vulnerability exists on import of project files. En PHOENIX CONTACT PLCnext Engineer versión 2020.3.1 y anteriores, presenta una vulnerabilidad de saneamiento de ruta inapropiada en la importación de archivos de proyecto • https://cert.vde.com/en-us/advisories/vde-2020-025 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation. El análisis de archivos mwe en Phoenix Contact PC Worx y PC Worx Express versiones 1.87 y anteriores, es vulnerable a una ejecución de código remota de lectura fuera de límites. Los proyectos manipulados de PC Worx podría conllevar a una ejecución de código remota debido a una comprobación de datos de entrada insuficiente This vulnerability allows remote attackers to execute arbitrary code on affected installations of Phoenix Contact Automationworx. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of MWE files by the PC WORX and PC WORX Express executables. • https://cert.vde.com/de-de/advisories/vde-2020-023 https://www.zerodayinitiative.com/advisories/ZDI-20-826 • CWE-121: Stack-based Buffer Overflow CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 15%CPEs: 2EXPL: 0

PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation. El análisis de archivos XML de PLCopen en Phoenix Contact PC Worx y PC Worx Express versiones 1.87 y anteriores, puede conllevar un desbordamiento en la región stack de la memoria. Los proyectos manipulados de PC Worx podrían conducir a una ejecución de código remota debido a una comprobación de datos de entrada insuficiente This vulnerability allows remote attackers to execute arbitrary code on affected installations of Phoenix Contact Automationworx. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PLCOpen XML files. • https://cert.vde.com/de-de/advisories/vde-2020-023 https://www.zerodayinitiative.com/advisories/ZDI-20-825 https://www.zerodayinitiative.com/advisories/ZDI-21-398 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service. Una Escalada de Privilegios Local puede presentarse en PHOENIX CONTACT PORTICO SERVER versiones hasta 3.0.7, cuando era instalado para ejecutarse como un servicio. • https://cert.vde.com/en-us/advisories/vde-2020-013 • CWE-269: Improper Privilege Management •