Schneider-electric

Somove

4 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 31.08.2020 17:15:12
  • Last modified 21.11.2024 05:37:18

Incorrect Default Permission vulnerability exists in SoMove (V2.8.1) and prior which could cause elevation of privilege and provide full access control to local system users to SoMove component and services when a SoMove installer script is launched.

  • EPSS 0.25%
  • Published 09.03.2018 23:29:00
  • Last modified 21.11.2024 04:11:51

A DLL hijacking vulnerability exists in Schneider Electric's SoMove Software and associated DTM software components in all versions prior to 2.6.2 which could allow an attacker to execute arbitrary code.

  • EPSS 2.19%
  • Published 01.02.2015 15:59:06
  • Last modified 05.09.2025 22:15:33

Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet...

Exploit
  • EPSS 57.66%
  • Published 01.04.2014 06:17:08
  • Last modified 12.04.2025 10:46:40

Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header.