![]() ![]() Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. The supported version that is affected is Java SE: 8u131. Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). , Axc 1050 Firmware, Axc 1050 Xc and 31 moreĪn unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.Ģ7 Debian Linux, Active Iq Unified Manager, Cloud Backup and 24 more In Phoenix Contact FL MGUARD 11 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.Ģ Phoenixcontact, Phoenixcontact-softwareĪn unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device. In Phoenix Contact FL MGUARD 11 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.Ĥ Fl Mguard 1102, Fl Mguard 1102 Firmware, Fl Mguard 1105 and 1 more 12 Axc F 1152, Axc F 1152 Firmware, Axc F 2152 and 9 more
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |