Filtered by vendor Aveva Subscriptions
Total 62 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-32942 1 Aveva 2 Intouch 2017, Intouch 2020 2024-09-17 6.6 Medium
The vulnerability could expose cleartext credentials from AVEVA InTouch Runtime 2020 R2 and all prior versions (WindowViewer) if an authorized, privileged user creates a diagnostic memory dump of the process and saves it to a non-protected location.
CVE-2021-32963 1 Aveva 1 Suitelink 2024-09-17 7.5 High
Null pointer dereference in SuiteLink server while processing commands 0x03/0x10
CVE-2021-32971 1 Aveva 1 Suitelink 2024-09-17 7.5 High
Null pointer dereference in SuiteLink server while processing command 0x07
CVE-2021-32987 1 Aveva 1 Suitelink 2024-09-16 7.5 High
Null pointer dereference in SuiteLink server while processing command 0x0b
CVE-2017-6021 2 Aveva, Schneider-electric 2 Clearscada, Clearscada 2024-09-16 N/A
In Schneider Electric ClearSCADA 2014 R1 (build 75.5210) and prior, 2014 R1.1 (build 75.5387) and prior, 2015 R1 (build 76.5648) and prior, and 2015 R2 (build 77.5882) and prior, an attacker with network access to the ClearSCADA server can send specially crafted sequences of commands and data packets to the ClearSCADA server that can cause the ClearSCADA server process and ClearSCADA communications driver processes to terminate. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2019-6545 1 Aveva 2 Indusoft Web Studio, Intouch Machine Edition 2014 2024-09-16 7.5 High
AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. An unauthenticated remote user could use a specially crafted database connection configuration file to execute an arbitrary process on the server machine.
CVE-2021-32979 1 Aveva 1 Suitelink 2024-09-16 7.5 High
Null pointer dereference in SuiteLink server while processing commands 0x04/0x0a
CVE-2011-3144 2 Aveva, Schneider-electric 3 Clearscada, Scx 67, Scx 68 2024-09-16 N/A
Cross-site scripting (XSS) vulnerability in Control Microsystems ClearSCADA 2005, 2007, and 2009 before R2.3 and R1.4, as used in SCX before 67 R4.5 and 68 R3.9, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2018-10620 1 Aveva 2 Indusoft Web Studio, Intouch Machine 2017 2024-09-16 9.8 Critical
AVEVA InduSoft Web Studio v8.1 and v8.1SP1, and InTouch Machine Edition v2017 8.1 and v2017 8.1 SP1 a remote user could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code to be executed.
CVE-2017-9962 1 Aveva 1 Clearscada 2024-09-16 N/A
Schneider Electric's ClearSCADA versions released prior to August 2017 are susceptible to a memory allocation vulnerability, whereby malformed requests can be sent to ClearSCADA client applications to cause unexpected behavior. Client applications affected include ViewX and the Server Icon.
CVE-2018-10628 1 Aveva 2 Intouch 2014, Intouch 2017 2024-09-16 N/A
AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process.
CVE-2019-6543 1 Aveva 2 Indusoft Web Studio, Intouch Machine Edition 2014 2024-09-16 9.8 Critical
AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. Code is executed under the program runtime privileges, which could lead to the compromise of the machine.
CVE-2021-32999 1 Aveva 1 Suitelink 2024-09-16 7.5 High
Improper handling of exceptional conditions in SuiteLink server while processing command 0x01
CVE-2023-31274 1 Aveva 1 Pi Server 2024-08-29 5.3 Medium
AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to cause the PI Message Subsystem of a PI Server to consume available memory resulting in throttled processing of new PI Data Archive events and a partial denial-of-service condition.
CVE-2024-6618 2 Aveva, Ocean Data Systems 2 Reports For Operations 2023, Dream Report 2023 2024-08-20 N/A
In Ocean Data Systems Dream Report, a path traversal vulnerability could allow an attacker to perform remote code execution through the injection of a malicious dynamic-link library (DLL).
CVE-2024-6456 1 Aveva 1 Historian 2024-08-19 N/A
AVEVA Historian Server has a vulnerability, if exploited, could allow a malicious SQL command to execute under the privileges of an interactive Historian REST Interface user who had been socially engineered by a miscreant into opening a specially crafted URL.
CVE-2024-6619 2 Aveva, Ocean Data Systems 2 Reports For Operations 2023, Dream Report 2023 2024-08-14 N/A
In Ocean Data Systems Dream Report, an incorrect permission vulnerability could allow a local unprivileged attacker to escalate their privileges and could cause a denial-of-service.
CVE-2011-3143 2 Aveva, Schneider-electric 3 Clearscada, Scx 67, Scx 68 2024-08-06 N/A
Use-after-free vulnerability in Control Microsystems ClearSCADA 2005, 2007, and 2009 before R2.3 and R1.4, as used in SCX before 67 R4.5 and 68 R3.9, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified long strings that trigger heap memory corruption.
CVE-2013-6142 1 Aveva 1 Clearscada 2024-08-06 N/A
DNP3Driver.exe in the DNP3 driver in Schneider Electric ClearSCADA 2010 R2 through 2010 R3.1 and SCADA Expert ClearSCADA 2013 R1 through 2013 R1.2 allows remote attackers to cause a denial of service (resource consumption) via IP packets containing errors that trigger event-journal messages.
CVE-2014-5413 2 Aveva, Schneider-electric 2 Clearscada, Scada Expert Clearscada 2024-08-06 N/A
Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 uses the MD5 algorithm for an X.509 certificate, which makes it easier for remote attackers to spoof servers via a cryptographic attack against this algorithm.