CVE-2022-1018
- EPSS 9.14%
- Published 01.04.2022 23:15:12
- Last modified 21.11.2024 06:39:52
When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. An attacker could exploit this to pass data from local files t...
CVE-2021-27471
- EPSS 0.05%
- Published 23.03.2022 20:15:09
- Last modified 21.11.2024 05:58:03
The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prio...
CVE-2021-27473
- EPSS 0%
- Published 23.03.2022 20:15:09
- Last modified 21.11.2024 05:58:03
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated ...
CVE-2021-27475
- EPSS 0.21%
- Published 23.03.2022 20:15:09
- Last modified 21.11.2024 05:58:04
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Compon...
CVE-2014-5424
- EPSS 0.29%
- Published 14.11.2014 00:59:00
- Last modified 12.04.2025 10:46:40
Rockwell Automation Connected Components Workbench (CCW) before 7.00.00 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an invalid property value to an ActiveX control that was built wit...