14 results (0.003 seconds)

CVSS: 8.0EPSS: 0%CPEs: 2EXPL: 0

14 Mar 2024 — The affected product is vulnerable to a cleartext transmission of sensitive information vulnerability, which may allow an attacker to capture packets to craft their own requests. El producto afectado es vulnerable a una transmisión de texto plano de información confidencial, lo que puede permitir a un atacante capturar paquetes para manipular sus propias solicitudes. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Softing edgeConnector Siemens. Auth... • https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-13 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

09 Aug 2023 — Softing edgeAggregator Permissive Cross-domain Policy with Untrusted Domains Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. Authentication is required to exploit this vulnerability. The specific flaw exists within the configuration of the web server. The issue results from the lack of appropriate Content Security Policy headers. • https://www.zerodayinitiative.com/advisories/ZDI-23-1059 • CWE-942: Permissive Cross-domain Policy with Untrusted Domains •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

09 Aug 2023 — Softing edgeAggregator Client Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the input parameters provided to the edgeAggregetor client. The issue results from the lack of proper validation of user-s... • https://www.zerodayinitiative.com/advisories/ZDI-23-1057 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.3EPSS: 6%CPEs: 1EXPL: 0

09 Aug 2023 — Softing edgeAggregator Restore Configuration Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of backup zip files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • https://www.zerodayinitiative.com/advisories/ZDI-23-1058 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

20 Oct 2022 — An issue was discovered in Softing OPC UA C++ SDK before 6.10. A buffer overflow or an excess allocation happens due to unchecked array and matrix bounds in structure data types. Se ha detectado un problema en Softing OPC UA C++ SDK versiones anteriores a 6.10. Es producido un desbordamiento del búfer o un exceso de asignación debido a los límites de matrices y arrays no comprobados en los tipos de datos de estructuras • https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-9.html • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

17 Aug 2022 — A crafted HTTP packet with a missing HTTP URI can create a denial-of-service condition in Softing Secure Integration Server V1.22. Un paquete HTTP diseñado con un URI HTTP faltante puede crear una condición de denegación de servicio en Softing Secure Integration Server versión V1.22. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing Secure Integration Server. Authentication is not required to exploit this vulnerability. The specific flaw ... • https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

17 Aug 2022 — A crafted HTTP packet with a large content-length header can create a denial-of-service condition in Softing Secure Integration Server V1.22. Un paquete HTTP diseñado con un encabezado de gran longitud de contenido puede crear una condición de denegación de servicio en Softing Secure Integration Server versión V1.22. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing Secure Integration Server. Authentication is not required to exploit this... • https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html • CWE-125: Out-of-bounds Read •

CVSS: 5.7EPSS: 0%CPEs: 6EXPL: 0

17 Aug 2022 — Softing Secure Integration Server V1.22 is vulnerable to authentication bypass via a machine-in-the-middle attack. The default the administration interface is accessible via plaintext HTTP protocol, facilitating the attack. The HTTP request may contain the session cookie in the request, which may be captured for use in authenticating to the server. Softing Secure Integration Server versión V1.22, es vulnerable a una omisión de la autenticación por medio de un ataque de tipo "machine-in-the-middle". Por defe... • https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

17 Aug 2022 — A crafted HTTP packet with a -1 content-length header can create a denial-of-service condition in Softing Secure Integration Server V1.22. Un paquete HTTP diseñado con un encabezado de longitud de contenido -1 puede crear una condición de denegación de servicio en Softing Secure Integration Server versión V1.22. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing Secure Integration Server. Authentication is not required to exploit this vuln... • https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 8.3EPSS: 58%CPEs: 6EXPL: 1

17 Aug 2022 — The application searches for a library dll that is not found. If an attacker can place a dll with this name, then the attacker can leverage it to execute arbitrary code on the targeted Softing Secure Integration Server V1.22. La aplicación busca una biblioteca dll que no es encontrada. Si un atacante puede colocar una dll con este nombre, entonces el atacante puede aprovecharla para ejecutar código arbitrario en Softing Secure Integration Server versión V1.22 objetivo. This vulnerability allows remote attac... • https://packetstorm.news/files/id/179646 • CWE-427: Uncontrolled Search Path Element •