what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

CVE-2007-1319

Status Candidate

Overview

Unspecified vulnerability in the IOPCServer::RemoveGroup function in the OPCDA interface in Takebishi Electric DeviceXPlorer OLE for Process Control (OPC) Server before 3.12 Build3 allows remote attackers to execute arbitrary code via unspecified vectors involving access to arbitrary memory. NOTE: this issue affects the (1) HIDIC, (2) MELSEC, (3) FA-M3, (4) MODBUS, and (5) SYSMAC OPC Servers.

Related Files

NB07-17.txt
Posted Mar 24, 2007
Authored by Lluis Mora, Xavier Panadero | Site neutralbit.com

The Takebishi Electric DeviceXplorer SYSMAC OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.

tags | advisory, vulnerability
advisories | CVE-2007-1319
SHA-256 | 51dbc8b41d20e28402e3f86a60d2bb549b073e580e6fbcfd89790242dce2a2ca
NB07-10.txt
Posted Mar 24, 2007
Authored by Lluis Mora, Xavier Panadero | Site neutralbit.com

The Takebishi Electric DeviceXplorer MODBUS OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.

tags | advisory, vulnerability
advisories | CVE-2007-1319
SHA-256 | 8cb33ba0ad4a128adf09db399a145e6e72c12a1b7920968c282f9e760c06697d
NB07-09.txt
Posted Mar 24, 2007
Authored by Lluis Mora, Xavier Panadero | Site neutralbit.com

The Takebishi Electric DeviceXplorer FA-M3 OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.

tags | advisory, vulnerability
advisories | CVE-2007-1319
SHA-256 | 52af4b4375b268850339d5b6df527f40e730e7722cacafcf9729cd0917d237b3
NB07-08.txt
Posted Mar 24, 2007
Authored by Lluis Mora, Xavier Panadero | Site neutralbit.com

The Takebishi Electric DeviceXplorer MELSEC OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.

tags | advisory, vulnerability
advisories | CVE-2007-1319
SHA-256 | 7af1ceb7670494e47ccb84c3bcb86b5dbed005eb143f1fd8bfb4d891ea6ba6d1
NB07-07.txt
Posted Mar 24, 2007
Authored by Lluis Mora, Xavier Panadero | Site neutralbit.com

The Takebishi Electric DeviceXplorer HIDIC OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.

tags | advisory, vulnerability
advisories | CVE-2007-1319
SHA-256 | 2daa115b0cc754c5e67f369025f7c8c0005d004b429f3a2174e65293cf1605e5
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close