Количество 3
Количество 3
CVE-2019-12871
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.
GHSA-534j-x2x2-hv47
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.
BDU:2019-02374
Уязвимость компонентов PC Worx, PC Worx Express, INTERBUS Config+ программного пакета Automationworx Software Suite, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-12871 An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation. | CVSS3: 8.8 | 2% Низкий | больше 6 лет назад | |
GHSA-534j-x2x2-hv47 An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation. | CVSS3: 8.8 | 2% Низкий | больше 3 лет назад | |
BDU:2019-02374 Уязвимость компонентов PC Worx, PC Worx Express, INTERBUS Config+ программного пакета Automationworx Software Suite, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 2% Низкий | больше 6 лет назад |
Уязвимостей на страницу