Filtered by vendor Microsys
Subscribe
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-4874 | 1 Microsys | 1 Promotic | 2017-08-28 | 7.9 HIGH | N/A |
Use-after-free vulnerability in MICROSYS PROMOTIC before 8.1.7 allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (data corruption and application crash) via a crafted project (aka .pra) file. | |||||
CVE-2016-0869 | 1 Microsys | 1 Promotic | 2016-02-23 | 7.1 HIGH | 5.0 MEDIUM |
Heap-based buffer overflow in MICROSYS PROMOTIC before 8.3.11 allows remote authenticated users to cause a denial of service via a malformed HTML document. | |||||
CVE-2014-9205 | 1 Microsys | 1 Promotic | 2015-03-30 | 7.5 HIGH | N/A |
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data. | |||||
CVE-2011-4518 | 1 Microsys | 1 Promotic | 2013-06-02 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the PmWebDir object in the web server in MICROSYS PROMOTIC before 8.1.5 allows remote attackers to read arbitrary files via unspecified vectors. | |||||
CVE-2011-4520 | 1 Microsys | 1 Promotic | 2013-05-23 | 4.3 MEDIUM | N/A |
Heap-based buffer overflow in an ActiveX component in MICROSYS PROMOTIC before 8.1.5 allows remote attackers to cause a denial of service via a crafted web page. | |||||
CVE-2011-4519 | 1 Microsys | 1 Promotic | 2013-05-23 | 4.3 MEDIUM | N/A |
Stack-based buffer overflow in an ActiveX component in MICROSYS PROMOTIC before 8.1.5 allows remote attackers to cause a denial of service via a crafted web page. | |||||
CVE-2000-1173 | 1 Microsys | 1 Cyberpatrol | 2008-09-05 | 5.0 MEDIUM | N/A |
Microsys CyberPatrol uses weak encryption (trivial encoding) for credit card numbers and uses no encryption for the remainder of the information during registration, which could allow attackers to sniff network traffic and obtain this sensitive information. |