Логотип exploitDog
bind:CVE-2018-14829
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-14829

Количество 3

Количество 3

nvd логотип

CVE-2018-14829

больше 7 лет назад

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-264m-mv26-f7f5

больше 3 лет назад

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2018-01149

больше 7 лет назад

Уязвимость библиотеки ENGINE.dll сервера связи RSLinx Classic, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 10
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-14829

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.

CVSS3: 9.8
48%
Средний
больше 7 лет назад
github логотип
GHSA-264m-mv26-f7f5

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.

CVSS3: 9.8
48%
Средний
больше 3 лет назад
fstec логотип
BDU:2018-01149

Уязвимость библиотеки ENGINE.dll сервера связи RSLinx Classic, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 10
48%
Средний
больше 7 лет назад

Уязвимостей на страницу