Количество 3
Количество 3
CVE-2018-14829
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.
GHSA-264m-mv26-f7f5
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.
BDU:2018-01149
Уязвимость библиотеки ENGINE.dll сервера связи RSLinx Classic, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-14829 Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code. | CVSS3: 9.8 | 48% Средний | больше 7 лет назад | |
GHSA-264m-mv26-f7f5 Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code. | CVSS3: 9.8 | 48% Средний | больше 3 лет назад | |
BDU:2018-01149 Уязвимость библиотеки ENGINE.dll сервера связи RSLinx Classic, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании | CVSS3: 10 | 48% Средний | больше 7 лет назад |
Уязвимостей на страницу