Search criteria
5 vulnerabilities by copadata
CVE-2019-15638 (GCVE-0-2019-15638)
Vulnerability from cvelistv5 – Published: 2019-12-04 14:50 – Updated: 2024-08-05 00:56
VLAI?
Summary
COPA-DATA zenone32 zenon Editor through 8.10 has an Uncontrolled Search Path Element.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T00:56:22.004Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://forum.copadata.com/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.copadata.com/fileadmin/user_upload/faq/files/CD_SVA_2019_5.pdf"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.copadata.com/en/support-services/knowledge-base-faq/pcd-sva-2019-5-nbspcopa-data-editor-security-3225/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "COPA-DATA zenone32 zenon Editor through 8.10 has an Uncontrolled Search Path Element."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-04T14:50:22",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://forum.copadata.com/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.copadata.com/fileadmin/user_upload/faq/files/CD_SVA_2019_5.pdf"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.copadata.com/en/support-services/knowledge-base-faq/pcd-sva-2019-5-nbspcopa-data-editor-security-3225/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15638",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "COPA-DATA zenone32 zenon Editor through 8.10 has an Uncontrolled Search Path Element."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://forum.copadata.com/",
"refsource": "MISC",
"url": "https://forum.copadata.com/"
},
{
"name": "https://www.copadata.com/fileadmin/user_upload/faq/files/CD_SVA_2019_5.pdf",
"refsource": "CONFIRM",
"url": "https://www.copadata.com/fileadmin/user_upload/faq/files/CD_SVA_2019_5.pdf"
},
{
"name": "https://www.copadata.com/en/support-services/knowledge-base-faq/pcd-sva-2019-5-nbspcopa-data-editor-security-3225/",
"refsource": "CONFIRM",
"url": "https://www.copadata.com/en/support-services/knowledge-base-faq/pcd-sva-2019-5-nbspcopa-data-editor-security-3225/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-15638",
"datePublished": "2019-12-04T14:50:22",
"dateReserved": "2019-08-26T00:00:00",
"dateUpdated": "2024-08-05T00:56:22.004Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2345 (GCVE-0-2014-2345)
Vulnerability from cvelistv5 – Published: 2014-06-05 17:00 – Updated: 2025-10-02 22:28
VLAI?
Summary
COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| COPA-DATA | zenon DNP3 NG driver (DNP3 master) |
Affected:
7.10 SP0 , ≤ 7.11 SP0 build 10238
(custom)
|
|||||||
|
|||||||||
Credits
Automation software company Ing. Punzenberger COPA-DATA GmbH
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.076Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "zenon DNP3 NG driver (DNP3 master)",
"vendor": "COPA-DATA",
"versions": [
{
"lessThanOrEqual": "7.11 SP0 build 10238",
"status": "affected",
"version": "7.10 SP0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "zenon DNP3 Process Gateway (DNP3 outstation)",
"vendor": "COPA-DATA",
"versions": [
{
"lessThanOrEqual": "7.11 SP0 build 10238",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Automation software company Ing. Punzenberger COPA-DATA GmbH"
}
],
"datePublic": "2014-06-03T06:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003e\n\nCOPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP.\n\n\u003c/p\u003e"
}
],
"value": "COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP."
}
],
"metrics": [
{
"cvssV2_0": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-02T22:28:23.701Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-154-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eBuild 11206 for Version zenon 7.11 is available that contains updated versions of the affected products that resolve the discovered vulnerabilities. COPA-DATA recommends upgrading or updating the affected products to this version.\u003c/p\u003e\u003cp\u003ePlease see Knowledge Base articles 179444 and 178001 located here:\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.copadata.com/en/support.html\"\u003ehttp://www.copadata.com/en/support.html\u003c/a\u003e\u003c/p\u003e\u003cp\u003eSystem integrators and asset owners should contact their local COPA-DATA representative for further information on how to obtain this update.\u003c/p\u003e\n\n\u003cbr\u003e"
}
],
"value": "Build 11206 for Version zenon 7.11 is available that contains updated versions of the affected products that resolve the discovered vulnerabilities. COPA-DATA recommends upgrading or updating the affected products to this version.\n\nPlease see Knowledge Base articles 179444 and 178001 located here:\u00a0 http://www.copadata.com/en/support.html \n\nSystem integrators and asset owners should contact their local COPA-DATA representative for further information on how to obtain this update."
}
],
"source": {
"advisory": "ICSA-14-154-01",
"discovery": "EXTERNAL"
},
"title": "COPA-DATA zenon DNP3 Improper Input Validation",
"x_generator": {
"engine": "Vulnogram 0.2.0"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-2345",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
"refsource": "CONFIRM",
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
},
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01"
},
{
"name": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
"refsource": "CONFIRM",
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2014-2345",
"datePublished": "2014-06-05T17:00:00",
"dateReserved": "2014-03-13T00:00:00",
"dateUpdated": "2025-10-02T22:28:23.701Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2346 (GCVE-0-2014-2346)
Vulnerability from cvelistv5 – Published: 2014-06-05 17:00 – Updated: 2025-10-02 22:27
VLAI?
Summary
COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow physically proximate attackers to cause a denial of service (infinite loop and process crash) via crafted input over a serial line.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| COPA-DATA | zenon DNP3 NG driver (DNP3 master) |
Affected:
7.10 SP0 , ≤ 7.11 SP0 build 10238
(custom)
|
|||||||
|
|||||||||
Credits
Automation software company Ing. Punzenberger COPA-DATA GmbH
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.250Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "zenon DNP3 NG driver (DNP3 master)",
"vendor": "COPA-DATA",
"versions": [
{
"lessThanOrEqual": "7.11 SP0 build 10238",
"status": "affected",
"version": "7.10 SP0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "zenon DNP3 Process Gateway (DNP3 outstation)",
"vendor": "COPA-DATA",
"versions": [
{
"lessThanOrEqual": "7.11 SP0 build 10238",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Automation software company Ing. Punzenberger COPA-DATA GmbH"
}
],
"datePublic": "2014-06-03T06:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003e\nCOPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow physically proximate attackers to cause a denial of service (infinite loop and process crash) via crafted input over a serial line.\n\n\u003c/p\u003e"
}
],
"value": "COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow physically proximate attackers to cause a denial of service (infinite loop and process crash) via crafted input over a serial line."
}
],
"metrics": [
{
"cvssV2_0": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-02T22:27:22.187Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-154-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eBuild 11206 for Version zenon 7.11 is available that contains updated versions of the affected products that resolve the discovered vulnerabilities. COPA-DATA recommends upgrading or updating the affected products to this version.\u003c/p\u003e\u003cp\u003ePlease see Knowledge Base articles 179444 and 178001 located here:\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.copadata.com/en/support.html\"\u003ehttp://www.copadata.com/en/support.html\u003c/a\u003e\u003c/p\u003e\u003cp\u003eSystem integrators and asset owners should contact their local COPA-DATA representative for further information on how to obtain this update.\u003c/p\u003e\n\n\u003cbr\u003e"
}
],
"value": "Build 11206 for Version zenon 7.11 is available that contains updated versions of the affected products that resolve the discovered vulnerabilities. COPA-DATA recommends upgrading or updating the affected products to this version.\n\nPlease see Knowledge Base articles 179444 and 178001 located here:\u00a0 http://www.copadata.com/en/support.html \n\nSystem integrators and asset owners should contact their local COPA-DATA representative for further information on how to obtain this update."
}
],
"source": {
"advisory": "ICSA-14-154-01",
"discovery": "EXTERNAL"
},
"title": "COPA-DATA zenon DNP3 Improper Input Validation",
"x_generator": {
"engine": "Vulnogram 0.2.0"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-2345",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
"refsource": "CONFIRM",
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=814\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
},
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-154-01"
},
{
"name": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase",
"refsource": "CONFIRM",
"url": "http://www.copadata.com/no_cache/en/support/knowledge-base-faq.html?tx_hrfaq_pi1%5Bknowledgebase%5D=813\u0026tx_hrfaq_pi1%5Baction%5D=show\u0026tx_hrfaq_pi1%5Bcontroller%5D=knowledgebase"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2014-2346",
"datePublished": "2014-06-05T17:00:00",
"dateReserved": "2014-03-13T00:00:00",
"dateUpdated": "2025-10-02T22:27:22.187Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-4534 (GCVE-0-2011-4534)
Vulnerability from cvelistv5 – Published: 2012-02-10 19:00 – Updated: 2024-09-17 04:04
VLAI?
Summary
ZenSysSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (service crash) or possibly execute arbitrary code via a series of connections and disconnections on TCP port 1101, aka Reference Number 25212.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:09:18.917Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf"
},
{
"name": "47892",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/47892"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ZenSysSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (service crash) or possibly execute arbitrary code via a series of connections and disconnections on TCP port 1101, aka Reference Number 25212."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-02-10T19:00:00Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf"
},
{
"name": "47892",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/47892"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2011-4534",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ZenSysSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (service crash) or possibly execute arbitrary code via a series of connections and disconnections on TCP port 1101, aka Reference Number 25212."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf"
},
{
"name": "47892",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47892"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2011-4534",
"datePublished": "2012-02-10T19:00:00Z",
"dateReserved": "2011-11-22T00:00:00Z",
"dateUpdated": "2024-09-17T04:04:22.986Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-4533 (GCVE-0-2011-4533)
Vulnerability from cvelistv5 – Published: 2012-02-10 19:00 – Updated: 2024-09-17 01:15
VLAI?
Summary
zenAdminSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted packet to TCP port 50777, aka Reference Number 25240.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:09:18.760Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf"
},
{
"name": "47892",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/47892"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "zenAdminSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted packet to TCP port 50777, aka Reference Number 25240."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-02-10T19:00:00Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf"
},
{
"name": "47892",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/47892"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2011-4533",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "zenAdminSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted packet to TCP port 50777, aka Reference Number 25240."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf",
"refsource": "MISC",
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-013-01.pdf"
},
{
"name": "47892",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/47892"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2011-4533",
"datePublished": "2012-02-10T19:00:00Z",
"dateReserved": "2011-11-22T00:00:00Z",
"dateUpdated": "2024-09-17T01:15:54.327Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}