11 results (0.012 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

18 Sep 2024 — An out-of-bounds read vulnerability exists in the OpenPLC Runtime EtherNet/IP PCCC parser functionality of OpenPLC_v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted network request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.This is the final instance of the incorrect comparison. • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2004 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

18 Sep 2024 — An out-of-bounds read vulnerability exists in the OpenPLC Runtime EtherNet/IP PCCC parser functionality of OpenPLC_v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted network request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.This is the first instance of the incorrect comparison. • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2004 • CWE-125: Out-of-bounds Read •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

18 Sep 2024 — A stack-based buffer overflow vulnerability exists in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC _v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted EtherNet/IP request can lead to remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability. • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2005 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

18 Sep 2024 — Multiple invalid pointer dereference vulnerabilities exist in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC_v3 16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a. A specially crafted EtherNet/IP request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger these vulnerabilities.This instance of the vulnerability occurs within the `Protected_Logical_Write_Reply` function • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2016 • CWE-704: Incorrect Type Conversion or Cast •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

18 Sep 2024 — Multiple invalid pointer dereference vulnerabilities exist in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC_v3 16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a. A specially crafted EtherNet/IP request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger these vulnerabilities.This instance of the vulnerability occurs within the `Protected_Logical_Read_Reply` function • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2016 • CWE-704: Incorrect Type Conversion or Cast •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

28 Jun 2024 — OpenPLC 3 through 9cd8f1b allows XSS via an SVG document as a profile picture. OpenPLC 3 a 9cd8f1b permite XSS a través de un documento SVG como imagen de perfil. • https://1d8.github.io/cves/cve_2024_37741 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 3%CPEs: 2EXPL: 13

03 Aug 2021 — Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the "Hardware Layer Code Box" component on the "/hardware" page of the application. Una Inyección de Comandos en Open PLC Webserver versión v3, permite a atacantes remotos ejecutar código arbitrario por medio del componente "Hardware Layer Code Box" en la página "/hardware" de la aplicación • https://github.com/Hunt3r0x/CVE-2021-31630-HTB • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

02 Aug 2021 — OpenPLC runtime V3 through 2016-03-14 allows stored XSS via the Device Name to the web server's Add New Device page. El runtime de OpenPLC versiones V3 hasta 14-03-2016, permite un ataque de tipo XSS almacenado por medio del Nombre del Dispositivo a la página Add New Device del servidor web • https://www.youtube.com/watch?v=eSAqXq4m8so • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 1

11 Jun 2021 — OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm. OpenPLC ScadaBR versiones hasta 0.9.1 en Linux y versiones hasta 1.12.4 en Windows, permite un ataque de tipo XSS almacenado por medio del archivo system_settings.shtm • http://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 1%CPEs: 2EXPL: 4

13 May 2021 — OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm. OpenPLC ScadaBR versiones hasta 0.9.1 en Linux y versiones hasta 1.12.4 en Windows permite a usuarios remotos autenticados cargar y ejecutar archivos JSP arbitrarios por medio del archivo view_edit.shtm • https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE • CWE-434: Unrestricted Upload of File with Dangerous Type •