Vulnerabilities (CVE)

Filtered by vendor Opto22 Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-40707 1 Opto22 2 Snap Pac S1, Snap Pac S1 Firmware 2023-08-29 N/A 7.5 HIGH
There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials.
CVE-2023-40709 1 Opto22 2 Snap Pac S1, Snap Pac S1 Firmware 2023-08-29 N/A 7.5 HIGH
An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b
CVE-2020-10616 1 Opto22 1 Softpac Project 2020-05-18 6.8 MEDIUM 8.8 HIGH
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC does not specify the path of multiple imported .dll files. Therefore, an attacker can replace them and execute code whenever the service starts.
CVE-2015-1007 1 Opto22 4 Optodatalink, Optoopcserver, Pac Display and 1 more 2019-10-09 9.3 HIGH 7.8 HIGH
A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional versions prior to R9.4008, PAC Project Basic versions prior to R9.4008, PAC Display Basic versions prior to R9.4g, PAC Display Professional versions prior to R9.4g, OptoOPCServer version R9.4c and prior that were installed by PAC Project installer, versions prior to R9.4008, and OptoDataLink version R9.4d and prior that were installed by PAC Project installer, versions prior to R9.4008. Opto 22 suggests upgrading to the new product version as soon as possible.