Filtered by vendor Siemens
Subscriptions
Total
2126 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-34289 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-054) | ||||
CVE-2022-34288 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 5.5 Medium |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-053) | ||||
CVE-2022-34287 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 5.5 Medium |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains a stack corruption vulnerability while parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-052, FG-VD-22-056) | ||||
CVE-2022-34286 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-051) | ||||
CVE-2022-34285 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 5.5 Medium |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-050) | ||||
CVE-2022-34284 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-049) | ||||
CVE-2022-34283 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 5.5 Medium |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-048) | ||||
CVE-2022-34282 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 5.5 Medium |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-047) | ||||
CVE-2022-34281 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-046) | ||||
CVE-2022-34280 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-045) | ||||
CVE-2022-34279 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-044) | ||||
CVE-2022-34278 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-043) | ||||
CVE-2022-34277 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-042) | ||||
CVE-2022-34276 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-041) | ||||
CVE-2022-34275 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-040) | ||||
CVE-2022-34274 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-039) | ||||
CVE-2022-34273 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-038) | ||||
CVE-2022-34272 | 1 Siemens | 1 Pads Viewer | 2024-11-21 | 7.8 High |
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-037, FG-VD-22-059) | ||||
CVE-2022-33736 | 1 Siemens | 1 Opcenter Quality | 2024-11-21 | 7.5 High |
A vulnerability has been identified in Opcenter Quality V13.1 (All versions < V13.1.20220624), Opcenter Quality V13.2 (All versions < V13.2.20220624). The affected applications do not properly validate login information during authentication. This could lead to denial of service condition for existing users or allow unauthenticated remote attackers to successfully login without credentials. | ||||
CVE-2022-33139 | 1 Siemens | 4 Cerberus Dms, Desigo Cc, Desigo Cc Compact and 1 more | 2024-11-21 | 9.8 Critical |
A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. |