漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability has been identified in CPC80 Central Processing/Communication (All versions < V16.41), CPCI85 Central Processing/Communication (All versions < V5.30), CPCX26 Central Processing/Communication (All versions < V06.02), ETA4 Ethernet Interface IEC60870-5-104 (All versions < V10.46), ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 (All versions < V03.27), PCCX26 Ax 1703 PE, Contr, Communication Element (All versions < V06.05). The affected devices contain an improper null termination vulnerability while parsing a specific HTTP header. This could allow an attacker to execute code in the context of the current process or lead to denial of service condition.
漏洞信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞
不恰当的空终结符
漏洞
Siemens 多款产品 安全漏洞
漏洞信息
Siemens CPC80 Central Processing是德国西门子(Siemens)公司的一个计算机处理器。 Siemens 多款产品存在安全漏洞,该漏洞源于受影响的设备固件在解析特定 HTTP 标头时包含不正确的空终止漏洞。以下产品及版本受到影响:CPC80 Central Processing/Communication,CPCI85 Central Processing/Communication。
漏洞信息
N/A
漏洞
N/A