Filtered by vendor Openautomationsoftware
Subscribe
Filtered by product Open Automation Software
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-22178 | 1 Openautomationsoftware | 1 Open Automation Software | 2025-01-23 | N/A | 4.9 MEDIUM |
A file write vulnerability exists in the OAS Engine Save Security Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability. | |||||
CVE-2024-27201 | 1 Openautomationsoftware | 1 Open Automation Software | 2025-01-23 | N/A | 4.9 MEDIUM |
An improper input validation vulnerability exists in the OAS Engine User Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to unexpected data in the configuration. An attacker can send a sequence of requests to trigger this vulnerability. | |||||
CVE-2024-21870 | 1 Openautomationsoftware | 1 Open Automation Software | 2025-01-23 | N/A | 4.9 MEDIUM |
A file write vulnerability exists in the OAS Engine Tags Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability. | |||||
CVE-2024-24976 | 1 Openautomationsoftware | 1 Open Automation Software | 2025-01-23 | N/A | 4.9 MEDIUM |
A denial of service vulnerability exists in the OAS Engine File Data Source Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can cause the running program to stop. An attacker can send a sequence of requests to trigger this vulnerability. | |||||
CVE-2024-11220 | 1 Openautomationsoftware | 1 Open Automation Software | 2025-01-23 | N/A | 7.8 HIGH |
A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation. |