Page 2 of 14 results (0.004 seconds)

CVSS: 10.0EPSS: 8%CPEs: 16EXPL: 0

24 Feb 2013 — 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors that trigger an out-of-bounds memory access. 3S CODESYS Gateway-Server anterior a v2.3.9.27, permite a atacantes remotos ejecutar código de su elección a través de vectores que lanzan un acceso a memoria fuera de rango. • http://ics-cert.us-cert.gov/advisories/ICSA-13-050-01A • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 9%CPEs: 17EXPL: 0

24 Feb 2013 — Stack-based buffer overflow in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via a crafted packet. Desbordamiento de búfer basado en pila en 3S CODESYS Gateway-Server anterior a v 2.3.9.27, permite a atacantes remotos ejecutar código de su elección a través de un paquete manipulado. • http://ics-cert.us-cert.gov/advisories/ICSA-13-050-01A • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 0

21 Jan 2013 — The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service. El Runtime Toolkit de CODESYS Runtime System v2.3.x y v2.4.x no requiere autenticación, lo que permite a atacantes remotos (1) ejecutar comandos a través de la interfaz de línea de comandos del servicio de escucha de TCP o (2) transferir ar... • http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 0

21 Jan 2013 — Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service. Vulnerabilidad de salto de directorio en el Runtime Toolkit de CODESYS Runtime System v2.3.x y v2.4.x que permite a atacantes remotos leer, sobreescribir, o crear ficheros a través de .. (punto punto) en una solicitud al servicio de escucha TCP. • http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •