CVE-2019-15638
https://notcve.org/view.php?id=CVE-2019-15638
COPA-DATA zenone32 zenon Editor through 8.10 has an Uncontrolled Search Path Element. COPA-DATA zenone32 zenon Editor versiones hasta la versión 8.10, tiene un Elemento de Ruta de Búsqueda No Controlada. • https://forum.copadata.com https://www.copadata.com/en/support-services/knowledge-base-faq/pcd-sva-2019-5-nbspcopa-data-editor-security-3225 https://www.copadata.com/fileadmin/user_upload/faq/files/CD_SVA_2019_5.pdf • CWE-427: Uncontrolled Search Path Element •
CVE-2014-2345
https://notcve.org/view.php?id=CVE-2014-2345
COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP. COPA-DATA Zenon DNP3 NG Driver (DNP3 master) 7.10 y 7.11 hasta 7.11 SP0 build 10238 y Zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 y anteriores permiten a atacantes remotos causar una denegación de servicio (bucle infinito y caída de proceso) mediante el envío de un paquete DNP3 manipulado sobre TCP. • http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01 http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase • CWE-20: Improper Input Validation •
CVE-2014-2346
https://notcve.org/view.php?id=CVE-2014-2346
COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow physically proximate attackers to cause a denial of service (infinite loop and process crash) via crafted input over a serial line. COPA-DATA Zenon DNP3 NG Driver (DNP3 master) 7.10 y 7.11 hasta 7.11 SP0 build 10238 y Zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 y anteriores permiten a atacantes físicamente próximos causar una denegación de servicio (bucle infinito y caída de proceso) a través de entradas manipuladas sobre una línea de serie. • http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01 http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814&tx_hrfaq_pi1%5Baction%5D=show&tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase • CWE-20: Improper Input Validation •
CVE-2011-4533
https://notcve.org/view.php?id=CVE-2011-4533
zenAdminSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted packet to TCP port 50777, aka Reference Number 25240. zenAdminSrv.exe en Ing. Punzenberger COPA-DATA zenon 6.51 SP0 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección a través de un paquete manipulado sobre el puerto 50777 (TCP), también conocido como referencia número 25240. • http://secunia.com/advisories/47892 http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf •
CVE-2011-4534
https://notcve.org/view.php?id=CVE-2011-4534
ZenSysSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (service crash) or possibly execute arbitrary code via a series of connections and disconnections on TCP port 1101, aka Reference Number 25212. ZenSysSrv.exe En Ing. Punzenberger COPA-DATA zenon V6.51 SP0 permite a atacantes remotos provocar una denegación de servicio (caída del servicio) o posiblemente ejecutar código de su elección a través de una serie de conexiones y desconexiones sobre el puerto TCP 1101, también conocido como referencia número 25212. • http://secunia.com/advisories/47892 http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf •